ICMP
ICMP
Enumeration on HTTP
I found a version info disclosure,manually check fot its exploits or I use to searchsploit to found the
exploit through this command
Searchsploit monitor
2> VULNERABILITY
I Have renamed this exploit to rce.py
EXPLOIT
Now setup a netcat listener on our target machine as this script is using a reverse shell concept,it will
be connect to us on a port.started listening on port no 1234
Privilege escalation
I got local.txt here
I got the password of fox user here in devel/crypt.php
I start privilege with sudo –l and got /usr/sbin/hping3 --icmp * and search in GTFOBIN for hping3
now go to your first terminal where first established ssh session as a fox is
sudo /usr/sbin/hping3 –icmp 127.0.0.1 –d 100 –sign signature –file /root/.ssh/id_rsa
Now copy the id_rsa into a file and change the permission
Now we will login as a root user on target machine using this id_rsa and got the root shell.