ghostđź‘»sonofabot-sec:~#

I scan, I map, I exploit .... Ghost is in your shell!!!

View on GitHub

HTB – SENSE

This is a retired htb box, quite intersting and direct

Screenshot_20220523_005522

Let’s Just Jump Right Into It

Recon

Running NMAP We Get Two Open Ports 80, 443; HTTP and HTTPS respectively

Screenshot_20220523_074908

Fuzzing for directories on the https with ffuf gives us a list of directories

I’ll advice you to let the entire wordlist runthrough so you don’t miss crucial things

Screenshot_20220523_080220

This box taught me you really have to run 1-3 enumeration of a certain service to prevent diving head first at rabbit holes Took close to 2 hours + enumerating and rabbit hole chasing All because I used the wrong wordlist and set some silly extentions initally

Foothold

Screenshot_20220522_014447

After getting the credentials from the system-users.txt we keep searching online then we find this

Screenshot_20220522_225031

So our login credentials should be rohit:pfsense

Logging in we are greeted with this, seems the repid7 link was spot on with it’s exploit

Screenshot_20220522_014456

Exploit

So here’s the direct thing, once you exploit the vulnerability you get ROOT!

So yh I saw an exploit on exploitdb

Screenshot_20220522_225231

Copy/Download the python code Read it, try to understand it a bit Set up your listener Execute it

Screenshot_20220523_010936

Screenshot_20220523_010931

AND WE ARE DONE

Hit me up on Twitter if you run into any issues



Back To Home