Game - Zone Walkthrough
Game - Zone Walkthrough
so there are two open ports , one is a webserver and other is a ssh port ,
so now we can be sure that website is vulnerable to SQL injection , now we will dump
the entire database of this website using SQL Map tool .
Okay so now we will use this authenticated session and use SQLMap to dump
passwords ,
so first we will capture the request of this authenticated session via burpsuite proxy :
just right click here and select copy to file and save it as request.txt
so, now this has started and just wait for it to complete and at the end we will get a hash
for user agent47 :
okay so now we got a username and a password hash , so now we will use the password
cracking tool that is “John The Ripper” to crack this hash and get a clear-text password :
copy the hash from above and store it into a text file.
Now lets crack this hash , we will use the rockyou.txt word list :
now we have cracked the password for a user , let’s try logging into the open SSH port
we discovered above :
so we have successfully logged into the machine and got initial access to it
user flag :
now we will be gaining access to some services on remote machine to our machine via
ssh port forwarding .
there is port on the remote machine running a service which may not be accessible to
other users then the remote machine ,
ssh port forwarding allows us to forward traffic from services , to and from local and
remote machines ,
so how do we do that :
So now as we can see there is an extra port listening and which was not discovered by
nmap to us , which means it was blocked due to some firewall rule ,
now lets forward that port from remote machine to our local machine using ssh port
forwarding :
ignore this terminal for a while and open your browser and visit localhost:10000
we see a new website running on this port , this means that our ssh port forwarding
worked successfully .
So now we are prompted with a new login page.
*always try previously discovered credentials in any type of penetration testing activity
so now we can see that this CMS is running on version “1.580” let’s see if this has any
exploits for it .
we will use this exploit to gain access and have escalated privileges.
DONE :-)