Writeups

Write ups and Walkthroughs about vulnerable machines

View on GitHub

Ignite

Back to Tryhackme page


Enumeration

Let’s start enumeration of machine using nmap.

nmap

There is only 1 open port i.e http. Let’s enumerate directories using gobuster.

gobuser

Every directory is redirecting to 404 page so nothing interesting here.

Checking website , I found there is FUEL cms used. So homepage shows default credentials and got logged in as admin in cms.

fuel cms login

There is no content on page other than default so further enumeration has no point.


RCE Exploit

Quick search on exploit-db shows available RCE exploits for fuel cms version 1.4.1 . Quickly setting up exploit gave remote code execution. Checking /home directory gives only one user is present with www-data as username. Exploit adds ‘system’ in front of output from machine.

ignite user flag

Now we have to focus on privilege escalation.


PrivEsc

Having admin access , I tried uploading PHP reverse shell but content link was giving 404 error. Tried getting reverse shell in already found exploit but it wasn’t connecting. After search , I found exploit that gives reverse shell and run it.

exploit execution

Got reverse shell here. I tried multiple attempts to check privese opportunity but didn’t find anything. Chekcing writeup for clue , I forgot to check database present on fuel CMS.

Got database file to my machine as reverse shell was not stable to output this data.

![fuel database]](fuel%20database.png)

So we got password for root user. It is “mememe” .

fuel database


Root flag

Switching user as root and using password found , I got root shell.

Ignite root flag

Got root flag!


Source :