Pie

nmap

I prefer to use rustscan with additional nmap flags as it's faster, but you can use plain nmap

mkdir nmap
sudo rustscan -a 172.31.1.26 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scan

We can see port 80 is open, let's quickly check if it's a web server.

Pi hole

Looks like it's really a web server, and it is running Pi hole

Navigate to /admin, and you will see the version of Pi hole in the footer

Exploitation

Search this Pi-hole version on searchsploit

Let's try to use the 6th result since it sounds more interesting than others.

First, let's mirror the exploit to our current working directory

As per the author we need the following to execute the exploit.

Let's run the exploit

Right after the script was finished, set a reverse shell listener

To trigger the shell, you have to navigate to /admin/scripts/pi-hole/php/fun.php

Then you should receive your root shell. :D

Last updated

Was this helpful?