Readys 🔸
Enumeration

Website at port 80 is a WordPress site.

Using wpscan, we find a local file inclusion in the plugin.


So we have alice user.
We can see the redis config at /etc/redis/redis.conf.

So we have alice user and the redis password Ready4Redis?.
We can log in to redis.

Initial Access
Searching for an RCE exploit:
https://github.com/jas502n/Redis-RCE

Privilege Escalation
Make another reverse shell for a more stable session.


mysql config:


admin:$P$Ba5uoSB5xsqZ5GFIbBnOkXA0ahSJnb0
Can't crack it.
Transfer linpeas.sh.

Using pspy64, we see it.


We can exploit the tar wildcard, but not with this user; we need alice.
Find a writable folder to put a PHP file and execute it like before with LFI and get a reverse shell.





Post Exploitation
Get the flags.
