USER : Dirbuster -> http://192.168.74.111/store/admin.php
Login with admin:admin, edit image and upload PHP reverse shell.
SSH with password.txt
ROOT : sudo time /bin/bash
Dawn
USER : smbclient //192.168.178.11/ITDEPT
Management.log in :80/logs shows web-control running as root.
uploaded python shell in smb ITDEPT share with name 'web-control'
Got reverse shell with cron.
ROOT : checking for SUID BITS, found /usr/bin/zsh -> euid=0
Machine Categories
SSTI
HTB - Late (Image to Text Application built with Flask)
Execute sandboxed Lua scripts through the “EVAL” command using dofile(), Capturing NTLM hash via responder by connecting with //tun0-ip//share, Powerview and sharpHound, BloodHound for enumeration and Abusing GPO Permission via SharpGPOAbuse.exe
Enumerating subdomains and finding CMS "typo3", backend api call for SQLi, password cracking to get in typo3 panel, uploaded reverse shell, cracked user mozilla history to find credentials, getcap to find openssl binary to read and replace passwd file to get root.