Blunder

Enumeration

nmap

$ nmap -sC -sV -oN nmap.txt 10.10.10.191

Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-16 21:56 BST
Nmap scan report for 10.10.10.191
Host is up (0.066s latency).
Not shown: 998 filtered ports
PORT   STATE  SERVICE VERSION
21/tcp closed ftp
80/tcp open   http    Apache httpd 2.4.41 ((Ubuntu))
|_http-generator: Blunder
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Blunder | A blunder of interesting facts

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.28 seconds

Apache httpd 2.4.41

dirsearch

wfuzz

After some extensive enumeration, the only usefull information found was the "todo.txt" file which contains a possible username ("fergus").

Creating wordlist with cewl

$ cewl -w wordlists.txt -d 10 -m 1 10.10.10.191/

Bruteforcing login cred

Exploitation

Metasploit

PivEsc

User: Hugo Pass: faca404fd5c0a31cf1897b823c695c85cffeb98d

Getting user.txt

Getting root.txt

Last updated

Was this helpful?