Jason
Last updated
Last updated
First scan the machine for open ports using rustscan and nmap.
I found only ssh
and http
ports, so let’s enumerate http
port. After some minutes of fuzzing I found nothing so I go to website and see request/respons
headers.
For every post that you do on the website it will do a session cookie. Whatever we pass as email seems to be getting serialized and then deserialized and posted to the page.
I find some explanation of how to exploit this.
First I try to see if I can execute commands using a simple ping command. This code needs to be serialized.
You also need to change rce with email. After this I change the command with a reverse shell.