In Every penetration testing engagement we start with reconnaissance, lets start with using our favorite tool “nmap”
Press enter or click to view image in full size
Later after digging in I searched for Jserv ghostcat, after that I managed to find an auxiliary module that reads a file.
Press enter or click to view image in full size
I managed to find the password for a User Called sky*** lets login into SSH and check if the credentials are valid.
Join Medium for free to get updates from this writer.
First we have to convert the gpg to readable text, so we can later crack it successfully.
Press enter or click to view image in full size
Second we import the GPG Hash with gpg in the sky*** user
Press enter or click to view image in full size
later we manage to login as the merlin user with the credential found and next, we type sudo -l to see what the user can run on the box.
we can see that /usr/bin/zip can be ran as sudo on merlin box, lets go to gtfoutbins to see the commands needed for root.
Bingo Root is achieved, until next ones!