Ignite
Enumeration machine.

Next part of enumeration.
gobuster dir -u http://10.10.200.99 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -z Interesting result:
/fuel (Status: 301) [Size: 311] [--> http://10.10.200.99/fuel/] 
We can log in and look for information.


Version of FUEL CMS : 1.4
On google we can find a ready-made exploit for our version FUEL CMS.

Now it's time for run our new exploit, get a shell and the first flag:


Uploading linpeas.sh from our machine.
Linpeas: https://github.com/carlospolop/PEASS-ng/releases/tag/20231015-0ad0e48c
Database found by linpeas:

In that file we can find password for root account.

Log in as root and get a second flag 🎉

Last updated