SecTalks: BNE0x02 - Fuku

Difficulty: Intermediate

Posted by Admin on December 3, 2019

CTF link

Scanning and Enum3ration

First thing I do is find the ip address and port scan, after that I find the active Apache server on port 13370.

arp-scan -l
nmap 192.168.2.102

After going to a webpage, I see a web site running on joomla.

Getting shell

In source code of page you can find the version of joomla.

Yeah, this version of joomla has many vulnerabilities, but in this case I need an exploit for changing the administrator password (Joomla! 1.5.x - 'Token' Remote Admin Change Password).

searchsploit joomla 1.5

After changing the administrator password, I successfully login into the site control panel.

After loading php reverse shell i get www-data.

Privil3ge escalation

In running processes you can see running Chkrootkit 0.49

ps -aux

After analyzing the vulnerability on exploitdb, I realized that I needed to create a file in the / tmp directory that should change the administrator password.

Now connect via ssh and get root.