Week 4 exploitation - nataneliezer/tech-journal GitHub Wiki

Here is a guide on how I was able to gather information and exploit the Cupcake system in Week 4

Reconnisance:

I used nmap -a 10.0.5.23 to gather information about the operating system and the most common open ports. This allowed me to research the software that was installed.

It was found that this was running an OpenSSH service and apache. With this information I was able to look at the vulnerabilities that these versions were susceptible to. Also by navigating to the actual website I was able to determine that this was using cgi-bin. This is what was used to attack the system.

An exploit was used for cgi-bin called shellshock which allowed for remote code execution. nmap was used to take advantage of this exploit.

From there we were able to use a password list on kali to brute force one of the users with hydra.

Lastly we were able to escalate privileges with a kernel exploit.