Cronos
Port Scanning
naabu -host cronos.htb
__
___ ___ ___ _/ / __ __
/ _ \/ _ \/ _ \/ _ \/ // /
/_//_/\_,_/\_,_/_.__/\_,_/ v2.0.5
projectdiscovery.io
Use with caution. You are responsible for your actions
Developers assume no liability and are not responsible for any misuse or damage.
[INF] Running CONNECT scan with non root privileges
[INF] Found 3 ports on host cronos.htb (10.10.10.13)
cronos.htb:53
cronos.htb:80
cronos.htb:22
Open ports
port 53 DNS
port 80 http default apache page
port 22 SSH
Checking for DNS Zone Transfer
New subdomain
Foothold
Webpage login page vulnerable to SQL injection
admin.cronos.htb
After successfully login , command execute is found to be allowed
input
;and reverse shell follows after that
Config file is presented in current directory
looking for user with home
looking at the database
ssh attempt unsuccessful
Priv Esc
cronjobs as found to be run as root
artisan file is a php file and we have read and write access
modified version
Open listener and wait for connection for root shell
Last updated