Marketing 🔸
Enumeration
Web server is a marketing page.
Using feroxbuster
, we find /old
path.
Inside the old index, there is a new link.
Add this to /etc/hosts
and access it.
Going to /admin
.
Searching default credentials.
Initial Access
We are in.
Using this exploit https://github.com/Y1LD1R1M-1337/Limesurvey-RCE (recreate the zip after editing the reverse shell).
Privilege Escalation
Limesurvey config files show SQL credentials.
sync.sh
Testing MySQL password with t.miller
is a go.
Get the flag.
With t.miller
we can execute /usr/bin/sync.sh
.
t.miller
is a staff
user and mlocate
user.
Transfer the database to Kali and inspect it, searching for the personal folder.
So we have to read creds-for-2022.txt
but if we pass the path to the program, it is going to fail because of the...
...part, so we can disguise it with a symbolic link.
Post Exploitation
Get the flag.