Shock
nmap
mkdir nmap
sudo rustscan -a 172.31.1.3 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scanA web service is open on port 80

And we can confirm that port 80 is really a web server.

Let's run Nikto, and after some time running, looks like the server is vulnerable to ShellShock vulnerability.

Exploitation
Since the shellshock vulnerability is pretty popular, we can find how to exploit and get a reverse shell from hacktricks
Craft the shell to your needs and you should receive your shell.

Privilege Escalation
Running sudo -l we can confirm that we can run socat with root privilege without a password.

To gain root privilege, run the following
Last updated
Was this helpful?