Sybaris 🔸
Enumeration
The web server has a PHP blog.
The blog is made with htmly
and Pablo.
ftp
shows an exit pub folder.
Using redis-cli
, we can connect; it is open.
We can upload a Redis module to execute system commands. Upload it to the ftp
server and load it with redis
.
https://book.hacktricks.wiki/en/network-services-pentesting/6379-pentesting-redis.html#load-redis-module
https://github.com/n0b0dyCN/RedisModules-ExecuteCommand#
Load the module from the default public vftpd
.
Execute a reverse shell.
Get the flag.
Privilege Escalation
Searching for passwords in the blog project, we find Pablo's.
It is better to connect via ssh
.
Transfer linpeas
.
Compile a shared object with malicious code and put it in /usr/local/lib/dev
and wait.
Post Exploitation
Get the flag.