ColddBox:Easy - Walkthrough [Vulnhub]

Here's my solution for ColddBox:Easy
The machine can be downloaded from here.

Port Scanning
Using nmap to scan all TCP ports.
$ nmap -sC -sV -p- 192.168.1.103


We find 2 ports open.

Enumeration.
Browsing the web, we observe that it is built on CMS- Wordpress.


We use wpscan to enumerate all plugins and users.
$ wpscan --url http://192.168.1.103/ -e ap,u


No plugins are found but wpscan did find users for us.

Since we have usernames we try to brute force the password.
$ wpscan --url http://192.168.1.103/ -U c0ldd -P /usr/share/wordlists/rockyou.txt 

Lets us login with the found credential.
Username: c0ldd
Password: 9876543210

We navigate to Appearance > Editor and select the 404 Template to place the php reverse shell payload.

Getting Access
To run the exploit, we browse /wp-content/themes/twentyfifteen/404.php and on the other hand we start the netcat listener.



We get the reverse shell.


We find a file- wp-config.php under /var/www/html/ directory.

On viewing the file we find database credential.
$ cat wp-config.php


We switch to user- c0ldd and enter the same password.
$ su c0ldd
Password: cybersecurity


User Flag


Privilege Escalation
We check for SUDO rights.

Lets escalate and get the root flag.





Comments

Popular posts from this blog

Sunset:Noontide - Walkthrough [Vulnhub]

CyberSploit:2 - Walkthrough [Vulnhub]

BBS(cute):1.0.1 - Walkthrough [Vulnhub]