Machine: https://www.vulnhub.com/entry/fristileaks-13,133/
NMap
scan shows http port 80 is open. There is a website running there.dirb
gives robots.txt
url.robots.txt
. But those links are not useful.http://192.168.0.10/fristi/
.eezeepz
Inside an html comment.base64
string inside another html comment.base64
to png
, it will load the image with the password keKkeKKeKKeKkEkkEk
.eezeepz
and password keKkeKKeKKeKkEkkEk
..jpg
extension.netcat
listener with nc -lvp port
. Then open the link http://{VM_IP}/fristi/uploads/{upload_file_name}
then we will get reverse shell.uname -a
we can find that version is vulnerable to dirty cow
. I used this exploit https://www.exploit-db.com/exploits/40839 and added a user named firefart
as root user with password password
.tty shell
to make the shell interactive with python -c 'import pty; pty.spawn("/bin/bash")'
and login as root user firefart
with su firefart
.fristileaks_secrets.txt
. Inside that file we have the flag Y0u_kn0w_y0u_l0ve_fr1st1
.Author: Zishan Ahamed Thandar