Ignite


Intro

Room Info

πŸ”— Name

🎯 Target IP

10.10.174.21

πŸ“ˆ Difficulty level

🟒Easy

πŸ’² Subscription type

Free

🐧 OS

Linux


Recon

πŸ“Œ Found FUEL CMS v. 1.4 on port 80

Local Recon

Navigate to

  • http://10.10.174.21/

  • http://10.10.174.21/fuel

    • admin:admin

Exploitation

  • Search for a Fuel CMS exploit

πŸ“Œ Fuel CMS 1.4.1 - Remote Code Execution (3)

Reverse Shell

  • Setup a Python web server and a nc listener on 2 different tabs

  • Back in the exploited Fuel CMS Enter Command $

  • 🚩 Reverse shell received in the nc terminal


Privilege Escalation

  • Enumerate Fuel CMS application

    • /var/www/html/fuel/application/config/

πŸ“Œ Found database credentials: root:mememe

  • Try to use those credentials for the root user of the system


Last updated

Was this helpful?