root💀n16hth4wk-sec:~#

Hack Enumerate Harder!. Eat. Sleep. Repeat.

View on GitHub

First enumeration with nmap

# Nmap 7.94SVN scan initiated Fri Mar 22 00:20:47 2024 as: nmap -sC -sV -T4 -oN service.nmap -p 22,23,80,3306 -Pn 192.168.190.41
Nmap scan report for 192.168.190.41
Host is up (0.17s latency).

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 5.3p1 Debian 3ubuntu7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   1024 83:92:ab:f2:b7:6e:27:08:7b:a9:b8:72:32:8c:cc:29 (DSA)
|_  2048 65:77:fa:50:fd:4d:9e:f1:67:e5:cc:0c:c6:96:f2:3e (RSA)
23/tcp   open  ipp     CUPS 1.4
|_http-server-header: CUPS/1.4
| http-methods: 
|_  Potentially risky methods: PUT
|_http-title: 403 Forbidden
80/tcp   open  http    Apache httpd 2.2.14 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Apache/2.2.14 (Ubuntu)
3306/tcp open  mysql   MySQL (unauthorized)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Mar 22 00:21:26 2024 -- 1 IP address (1 host up) scanned in 39.73 seconds

Enumerating web server

image

a web server is running on port 80, opening it on a browser, we got an under construction response on the webpage.

image

fuzzing for hidden dir, we can see dir /test.

image

navigating to the dir, we ca see it is running an image service Zenphoto.

image

checking the source code of the web page, we can see the version of the service. 1.4.1.4.

image

found an exploit on searcsploit.

image

run the exploit and we got RCE.

image

popped a reverse shell.

Privilege Escalation

image

after sometime of trial and error, used pwnkit and it worked.

image

And we are through.