Pie
Last updated
Was this helpful?
Last updated
Was this helpful?
I prefer to use rustscan
with additional nmap
flags as it's faster, but you can use plain nmap
We can see port 80 is open, let's quickly check if it's a web server.
Looks like it's really a web server, and it is running Pi hole
Navigate to /admin, and you will see the version of Pi hole in the footer
Search this Pi-hole version on searchsploit
Let's try to use the 6th result since it sounds more interesting than others.
First, let's mirror the exploit to our current working directory
As per the author we need the following to execute the exploit.
Let's run the exploit
Right after the script was finished, set a reverse shell listener
To trigger the shell, you have to navigate to /admin/scripts/pi-hole/php/fun.php
Then you should receive your root shell. :D