Payday
Use sudo su with full sudo rights
Summary
Discovered multiple open services including Apache, IMAP/POP3, Samba, and SSH.
CS-Cart web application on port 80 allowed default login as
admin:admin
.Used exploit for CS-Cart to get RCE via PHP webshell.
SSH brute-forced user
patrick
's credentials using Hydra.Privilege escalation via
sudo su
aspatrick
had full sudo access.
🧵 Let's Unpack
🔎 Enumeration
Port 80 hosted CS-Cart (Apache 2.2.4 with PHP 5.2.3)
IMAP, POP3, and SSL variants running via Dovecot
Samba open on ports 139 and 445
SSH running OpenSSH 4.6p1
âš¡ Initial Foothold
Web login worked with default creds:
admin:admin
Got a shell as
www-data
🪜 Privilege Escalation
SSH brute-force was required for user
patrick
Full
sudo
access forpatrick
allowed immediate escalation:
Last updated
Was this helpful?