Cassandra Web 3000 [Initial]
I found that cassandra web is hosted on port 3000.

Found one exploit related to this. This exploit is realted to Remote file read.
Exploiting for ssh key

checking for help.

Trying to read /etc/passwd file.

This worked.!!!
We can see that SSH port is open let's check for sshd config file.
No user is restricted to use SSH service.

Let's check for ssh key in user's home directory one by one.
Making list:
Make a list of user present

Make list of Names of SSH files in linux
Checking for SSH Key
Didn't get any SSH key.
Command example:
In the exploit, I can see that there is command example:
Let's run this and check if we can get the password.

I got the password.
Let's try to SSH using this.

This didn't work.
Checked Default password file of freeSwitch
After doing google, I found that the default file for storing passwords is /etc/freeswitch/autoload_configs/event_socket.conf.xml for freeswitch.

I found the default Credential of FreeSwitch so, I use the exploit related to this.

Run the exploit.

It's working.
Let's check shell from this.


Got the shell.
Stabalize the shell.
Last updated
Was this helpful?
