Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-19 05:44 EATWarning: 192.168.237.194 giving up on port because retransmission cap hit (6).Nmap scan report for 192.168.237.194Host is up (0.19s latency).Not shown: 65322 closed tcp ports (conn-refused), 211 filtered tcp ports (no-response)PORT STATE SERVICE VERSION80/tcp open http Apache httpd 2.4.10 ((Debian))|_http-title: Did not follow redirect to http://dc-2/|_http-server-header: Apache/2.4.10 (Debian)7744/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u7 (protocol 2.0)| ssh-hostkey: | 1024 52:51:7b:6e:70:a4:33:7a:d2:4b:e1:0b:5a:0f:9e:d7 (DSA)| 2048 59:11:d8:af:38:51:8f:41:a7:44:b3:28:03:80:99:42 (RSA)| 256 df:18:1d:74:26:ce:c1:4f:6f:2f:c1:26:54:31:51:91 (ECDSA)|_ 256 d9:38:5f:99:7c:0d:64:7e:1d:46:f6:e9:7c:c6:37:17 (ED25519)Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
http Enumeration(port 80)
On scanning our machine with feroxbuster we see that it has a WordPress website present but before the website opens you have to first set the dc-2 domain in the /etc/hosts file.
FEROXBUSTER
![[dc2-1.png]]
Attacking a WordPress website
![[dc-2.png]]
After scanning the site we see it uses "WordPress version 4.7.10" and we see two users admin , jerry and Tom Now we going to try to do a bruteforce attack to the login form, with the use of cewl is generated a customised password list from the site ans saved it in has password.txt.
On attacking the users we get the password of Tom
![[tom.png]]
Gaining Access
Username: tom, Password: parturient
since i have tom's creds, let me try to login with ssh
![[ssh-1.png]]
I tried cat local.txt and it failed and also tried to see if python is present so i could change from the restricted shell, i tried to run vi on the file and surprisingly it works and managed to get the flag for tom.
i used vi to escapt to restricted shell, with some research i found here and after you set a $PATH
after you set a $PATH you can see that your cat command now works, when you open flag3.txt has a message for us to su to jerry
![[dc2-3.png]]
Finding jerry's password
the password for jerry is "adipiscing"
privilege escalation
![[je.png]]
user jerry can run /usr/bin/git as admin, when you got GTFObin and you search for git, you will see how to get a root shell
This command invokes the default pager, which is likely to be less, other functions may apply then try to search for strings in it with this command and you will get a root shell
![[dc2-4.png]]
change to a root parental directory for the last flag