Ignite
Intro
Room Info

π Name
π― Target IP
10.10.174.21
π Difficulty level
π’Easy
π² Subscription type
Free
π§ OS
Linux
Recon
π Found FUEL CMS v. 1.4 on port
80
Local Recon
Navigate to
http://10.10.174.21/http://10.10.174.21/fueladmin:admin
Exploitation
Search for a Fuel CMS exploit

Reverse Shell
Setup a Python web server and a
nclistener on 2 different tabs
Back in the exploited Fuel CMS
Enter Command $
π© Reverse shell received in the
ncterminal
Privilege Escalation
Enumerate Fuel CMS application
/var/www/html/fuel/application/config/
π Found database credentials:
root:mememe
Try to use those credentials for the
rootuser of the system

Last updated
Was this helpful?