Sybaris 🔸
Enumeration

The web server has a PHP blog.


The blog is made with htmly and Pablo.

ftp shows an exit pub folder.
Using redis-cli, we can connect; it is open.
We can upload a Redis module to execute system commands. Upload it to the ftp server and load it with redis.
https://book.hacktricks.wiki/en/network-services-pentesting/6379-pentesting-redis.html#load-redis-module
https://github.com/n0b0dyCN/RedisModules-ExecuteCommand#


Load the module from the default public vftpd.

Execute a reverse shell.


Get the flag.

Privilege Escalation
Searching for passwords in the blog project, we find Pablo's.

It is better to connect via ssh.
Transfer linpeas.


Compile a shared object with malicious code and put it in /usr/local/lib/dev and wait.


Post Exploitation
Get the flag.
