Skip to main content
  1. CTF Writeups/

Scrutiny

·135 words·1 min
Muqaram Majid
Author
Muqaram Majid
Just jotting down my thoughts

Scrutiny
#

Overview
#

  • OS: Linux
  • IP: 192.168.126.91
  • Difficulty: Intermediate
  • Platform: OffSec
  • OSCP: Yes
  • Lists: N/A

Summary
#

RCE and then privesc with mail and exposed creds.

Loot
#

Loot
CategoryDetails
Usernames
Passwords
Usernames+Passwords
Hashes
Service Versions

Enumeration
#

Nmap
#

Nmap was my starting point here, and the service/version clues below shaped the next checks.

lets add onlyrands.com to our hosts

Dirbusting
#

Port 80
#

Web behavior was the main signal here, so I traced each response change before exploitation.

add this to our hosts aswell

great i think we can try getting in from here lets check

Exploitation
#

https://github.com/joshuavanderpoll/cve-2024-56348

aa

lfound a 0xdf post telling us to enable debug first so lets do that

export TOKEN="<TOKEN HERE>"

checking around the website because that failed

we find this

we got mail