DevContainer: 1

Easy machine from vulnhubarrow-up-right.

Website at port 80

Enumeration:

1) Target IP: 10.0.2.15. Nmap all port scan: nmap -p- -T5 -Pn -v 10.0.2.15

2) Target scan of port 80: nmap -sV -sC -v -p 80 10.0.2.15

3) scanning web: nikto -h http://10.0.2.15/arrow-up-right

4) Trying web directory scan, only this reveals some info.

gobuster dir -u http://10.0.2.15/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

5) /mail, /img these are forbidden and can not access. But the /upoad directory works here. This also revelas allowed file types.

To test, I have uploaded a general image. This operation is showing it uploaded in /upload.php . So the web is running on php.

Exploitation:

6) This blog post shows some technique to bypass filtering: File uploadarrow-up-right

7) Uploaded this shell and immediately get a reverse shell: pentestMonkeyarrow-up-right . I had to modify the IP and Port of this script.

8) Linpeas scan shows that, writable file available

circle-info

machine is not giving any output. need to find out whats wrong

Last updated