Sunset:Midnight - Walkthrough [Vulnhub]

Here's my solution for Sunset:Midnight.
The machine can be downloaded from here.

Nmap
Scanning for all TCP ports.
nmap -sC -sV -p- 192.168.1.107


We find 3 open ports.

Enumeration
Lets map the IP to host name- sunset-midnight, in the /etc/hosts file.


Browsing the web and checking the source, did not give us any hint, but we find that it is built on CMS- Wordpress.


Brute forcing Mysql on port 3306.


We get the password as- robert

Accessing Mysql.





On our machine, we create a password as- admin



On target machine, we change the password for user- admin.


Now we have the credentials as-
User: admin
Password: admin

We browse the /wp-login.php page and login as- admin.


Navigate to Appearance > Theme Editor, and select the theme as- Twenty Nineteen.


We select 404 Template, to place our php reverse shell payload.


Getting Access
To run the exploit we browse http://sunset-midnight/wp-content/themes/twentynineteen/404.php
And on the other hand we start the netcat listener.


We have a reverse shell.

Privilege Escalation.
We find the password for user- jose.



Lets switch to user- jose and get the User Flag.
su jose
password: 645dc5a8871d2a4269d4cbe23f6ae103


From Jose > Root
We check for SUID permissions.


Root Flag.


Comments

Popular posts from this blog

Sunset:Noontide - Walkthrough [Vulnhub]

CyberSploit:2 - Walkthrough [Vulnhub]

BBS(cute):1.0.1 - Walkthrough [Vulnhub]