Author: TheCyberGeek
Initial Enumeration
nmap
sql
1 | # Nmap 7.93 scan initiated Sun Apr 30 06:01:00 2023 as: nmap -sC -sV -oN nmap/monitorstwo 10.129.75.142 |
Web
Checking the exploit for the version we find
https://www.rapid7.com/db/modules/exploit/linux/http/cacti_unauthenticated_cmd_injection/
So using the payload as
we can get a shell (Had to bruteforce the host_id and local_data_id)
Checking in DB we get
Cracking the password we get
Privilege Escalation
nginx
1 | sshpass -p 'funkymonkey' ssh marcus@10.129.76.172 |
Checking the mail of marcus we see
Getting the mount info for the container (From Container Process)
we will need root
on the container we can get that with capsh
Confirm the Hostname in docker
Modifying the file to be bash with -s to have it sticky permission
and we are rooted