🟒knife

Recon & Enum

port scan

PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http

directory scan

/.html                (Status: 403) [Size: 277]
/index.php            (Status: 200) [Size: 5815]
/.html                (Status: 403) [Size: 277]
/server-status        (Status: 403) [Size: 277]

website

nothing interesting over here , just a static page Although we intercepted in response shows php version

X-Powered-By: PHP/8.1.0-dev

shell as james

we can search exploit for this , after searching i got this exploit :-

privesc james -> root

after searching on GTFObins , i got this :-

and i got the shell as root

Last updated