Skip to content

Latest commit

 

History

History
70 lines (34 loc) · 2.77 KB

File metadata and controls

70 lines (34 loc) · 2.77 KB

Download; https://www.vulnhub.com/entry/sectalks-bne0x03-simple,141/

1

We scan the machine with nmap. When we look at the results, the http service is running on port 80. let's request then.

2

We use nikto.When we look at the results, we see the docs directory and license.txt. We will use dirb for directory discovery

3

4

We look at the license.txt file and see that cutePhP is used there and see if there is an exploit associated with it.

5

We found the exploit, now we are doing the necessary steps.

6

We register

7

We see the file upload page above.Now. We save the php reverse shell file as rev.jpeg and open burpsuite while doing this.

8

We are making the necessary adjustments for the reverse shell.

9

We change the rev.jpeg file to rev.php. We go to the uploads directory.

9

We can see that we have uploaded.

10

We open a reverse connection with nc.

12

When we click on the file we uploaded to the uploads directory, we get a connection.

11

I use the exploit in the screenshot above to become root.

13

I see that I am root.

14

I read the flag.txt in the root directory and the ctf ends there.