Cronos
DNS Enumeration - Command Injection - CronJob PrivEsc
Last updated
DNS Enumeration - Command Injection - CronJob PrivEsc
Last updated
Visiting the admin subdomain !
admin/admin - Din't work
admin/pass - Din't work
administrator/password123 - Din't work
Finally tried SQLi and it worked !
Possibly we can try OS Command Injection !
Confirming it is vulnerable to command injection, we can now insert a reverse shell and get a connection back :)
Unfortunately, it doesn't send us a reverse shell back, let's try with python
And we get a hit :)
Checking the crontab
Viewing the permission of the file - /var/www/laravel/artisan
We don't have -w- permissions :(
But what we can do is, we can remove the existing file and transfer our php-reverse shell to this location and rename it as artisan :)