Skip to main content
  1. CTF Writeups/

Codo

·100 words·1 min
Muqaram Majid
Author
Muqaram Majid
Just jotting down my thoughts

Codo
#

Overview
#

  • OS: Linux
  • IP: 192.168.192.23
  • Difficulty: Easy
  • Platform: OffSec
  • OSCP: Yes
  • Lists: N/A

Summary
#

default creds on web portal —> file upload —> exposed creds.

Loot
#

Loot
CategoryDetails
Usernames
Passwords
Usernames+Passwords
Hashes
Service Versions

Enumeration
#

Nmap
#

Dirbusting
#

Port 80
#

Web behavior was the main signal here, so I traced each response change before exploitation.

Exploitation
#

admin admin default creds worked lmaooo

we find this

https://www.exploit-db.com/exploits/50978

made some changes here

and then accessed the payload

we just used a simple pentestmonkey rev shell btw

anyways we are in

PrivESC
#