Box Stats
Box Info | Details |
---|---|
Box Name : | DC 3 |
Series : | DC |
Difficulty : | Easy/Medium |
Release Date : | 25 Apr 2020 |
OS : | GNU/Linux |
Maker : | DCAU |
Download : | DC 3 |
Recommended : | Yes ![]() |
Summary
Hello all, let’s continue the DC series. This box was an easy one, it’s about a vulnerable to SQLi joomla version. This gives us the creds we login and upload out shell. Privesc to root is a simple kernel exploit. Let’s pwn it!
PoC
Target IP
Always first step is to find target IP address, i prefer to use the arp-scan
utility. Then we’ll save the IP address in a variable.
1 |
|
Enumeration/Reconnaissance
Now as always let’s continue with a nmap scan.
1 |
|
Once we visit the website we can see that is running joomla. We can double-check that using whatweb
.
1 |
|
Googling around for a joomla vulnerability scanner, i found out this joomscan that is pre-installed on kali. Let’s fire it up!
1 |
|
A really important thing that tell us is the version 3.7.0
! Let’s search for possible exploits.
1 |
|
Perfect, this exploit is about sqlmap
i googled around and i found a python one that automates this. Let’s download it and run it.
1 |
|
Perfect! We have admin’s hash. I used tunnelsup to find the hash type.
Let’s fire up our friend john.
1 |
|
Shell as www-data
Now we can login into admin panel /administrator
as admin:snoopy
. Follow my steps for a reverse shell:
1 |
|
Shell as root
I enumerated a lot but i really didn’t find something exploitable. But the last time the kernel was compiled was years ago.
1 |
|
Let’s upload linux-exploit-suggester to give us possible exploits.
1 |
|
I tried lot of them but only one worked the double-fdput()
let’s download it -> compile it -> execute it!
1 |
|
Reading the flag(s)
1 |
|
Thank You
Thank you for taking the time to read my writeup. If you don’t understand something from the writeup or want to ask me something feel free to contact me through discord(0xatom#8707) or send me a message through twitter 0xatom
Until next time keep pwning hard!