Extplorer

Nmap Scan

$ nmap -sC -sV -p- --min-rate 10000 -Pn -oN nmap 192.168.206.16
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-07 15:55 +08
Nmap scan report for 192.168.206.16
Host is up (0.010s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 98:4e:5d:e1:e6:97:29:6f:d9:e0:d4:82:a8:f6:4f:3f (RSA)
|   256 57:23:57:1f:fd:77:06:be:25:66:61:14:6d:ae:5e:98 (ECDSA)
|_  256 c7:9b:aa:d5:a6:33:35:91:34:1e:ef:cf:61:a8:30:1c (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 117.86 seconds

Initial Access

Port 80

There is a wordpress page running on it.

After clicking on Let's go!, we are brought to this page.

However, if we press on submit, we are greeted with this error message.

Since, it is a wordpress page, we will try to use wpscan to see if there is any interesting results.

However, there is no interesting results.

Directory Enumeration

The next step is to check if there is a hidden directory.

There is a /filemanager directory that we can access.

We can see that there is a extplorer service running.

After some research, we can see that it is a PHP-based File Manager. The next thing to try is the default password.

Sure enough, after trying admin:admin, we are able to login.

Extplorer Enumeration

We can also see that dora is a user from this service.

Getting Reverse shell using webshell

Firstly, we will create a file called revshell.php

Next, we will craft the webshell payload. This is the payload to be inserted:

After that, we will put the payload into revshell.php and save it after clicking into it.

The final step is to open a netcat listener and visit that webpage to trigger the payload.

We will upgrade the shell using python.

Lateral Movement

Getting dora's hash

After some enumeration, we can see dora's hash on /filemanager/config/.htusers.php.

Next, we will crack the hash.

However, we require a public key to login into ssh.

We can just su as dora to get a shell.

Privilege Escalation

Disk group privilege escalation

We first will list down the mount.

Next, we will use debugfs to get the content of proof.txt.

However, we are not able to get a shell. But we are able to access /etc/shadow.

From there, we can crack the hash.

After getting the password, we can just change user to root from the reverse shell.

Last updated