Privilege escalation

I have a password for a user named as cassie so, I will switch to that user.

cassie:'SecondBiteTheApple330'

I will see the help for this binary.

Let's run this web server.

We have web server running at port 4444.

According to this exploit. We know that Cassandra web is vulnerable to Remote File Read (Directory Traversal). We will exploit this to read the .bash_history file for the user.

circle-info

Add a list of files that can be read using Directory traversal in Cheatsheet.

Confirmed that it is vulnerable to Directory traversal. Then I read the bash history file of Anthony user.

I found that an SSH key has been generated for the user Anthony, and the same SSH key has been copied to the root user. This means that if I am able to grab Anthony's SSH key, I can log in as the root user. I will grap the private SSH key.

Save it.

Give permission to SSH key and then connect to root user.

Last updated

Was this helpful?