CMS
nmap
mkdir nmap
sudo rustscan -a 172.31.1.8 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scan A web service is available on port 80

Web enumeration
Looks like the website is running on WordPress

Run wpscan and after a few seconds, looks like it is vulnerable to Local File Inclusion

Exploitation
We can use LFI to grab /etc/passwd

Then grab the Private SSH Key of user angel

Exploitation
Log in via SSH using the id_rsa file we found.
Privilege Escalation
We can run any sudo command without a password. Just run sudo su to log in as root.

Last updated
Was this helpful?