Bratarina

nmap

mkdir nmap 
sudo rustscan -a 192.168.225.71 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-vuln-scan --script vuln 

OpenSMTPD is open on port 25

There's a possible RCE on this particular service.

After doing some GoogleFu, I found this better version of the exploit: https://github.com/QTranspose/CVE-2020-7247-exploitarrow-up-right

Exploitation

Copy the main.py file in your local machine. And install pwntools

Run the exploit

And you should get your root shell.

Thanks for reading!

Last updated