βœ…Blocky (Easy)

Lesson Learn

Report-Penetration

Vulnerable Exploit:

System Vulnerable: 10.10.10.37

Vulnerability Explanation:

Privilege Escalation Vulnerability:

Vulnerability Fix:

Severity:

Step to Compromise the Host:

Reconnaissance

Enumeration

Port 80 WordPress 4.8

Run gobuster to find hidden directory

There are 2 web login page. /wp-admin and /phpmyadmin. On /plugins we have 2 files.

Let download both the files and decompile it on our local machine.

Install jd-gui for java decompiler.

We can have gui of java decompiler and we can open the BlockyCore file

Login with the root user, it doesn't work all of the service.

Exploitation

By visiting the webpage, we see the author name

By ssh with user notch and password we found, it's worked.

Privilege Escalation

Checking on sudo -l, we can run any command as root without password.

Last updated