Skip to content

Readys 🔸

Enumeration

Web site at 80 is a wordpress site

Using wpscan we find a local file inclusion in the plugin

So we have alice user

We can see redis config at /etc/redis/redis.conf

So we have alice user and the redis pass Ready4Redis?

We can log in in redis

Initial Access

Searching an rce exploit

https://github.com/jas502n/Redis-RCE

Privilege Escalation

Make another reverse shell for using it more stable

Mysql config

admin:$P$Ba5uoSB5xsqZ5GFIbBnOkXA0ahSJnb0

Can't crack it

Transfer linpeas.sh

Using pspy64 we see it

We can exploit tar wildcard , but not withs this user, we need alice.

Find writable folder to put a php file and execute it like before with lfi and get a reverse shell.

Post Exploitation

Get flags