![[Dog.png]]
Summary¶
Walkthrough¶
- Nmap
- GoBuster
- robots.txt
- git-dumper
- see organization email
- find matching mail in dump
- find password in config
- login
- search version of backdrop cms for exploit
- see that modules can be exploited from admin page
- list /etc/passwd or reverse shell script
- explore a bit, notice no access
- try password spraying
- login as jonhcusack FLAG
- sudo -l
- see bee binary, notice it has to be run from wherever backdrop is
- run in /var/www/html with php-script command system("/bin/bash")
- ROOT