Cronos

Port Scanning

naabu -host cronos.htb

                  __
  ___  ___  ___ _/ /  __ __
 / _ \/ _ \/ _ \/ _ \/ // /
/_//_/\_,_/\_,_/_.__/\_,_/ v2.0.5

		projectdiscovery.io

Use with caution. You are responsible for your actions
Developers assume no liability and are not responsible for any misuse or damage.
[INF] Running CONNECT scan with non root privileges
[INF] Found 3 ports on host cronos.htb (10.10.10.13)
cronos.htb:53
cronos.htb:80
cronos.htb:22

Open ports

  • port 53 DNS

  • port 80 http default apache page

  • port 22 SSH

Checking for DNS Zone Transfer

New subdomain

Foothold

Webpage login page vulnerable to SQL injection

admin.cronos.htb

After successfully login , command execute is found to be allowed

  • input ; and reverse shell follows after that

Config file is presented in current directory

looking for user with home

looking at the database

ssh attempt unsuccessful

Priv Esc

cronjobs as found to be run as root

artisan file is a php file and we have read and write access

modified version

Open listener and wait for connection for root shell

Last updated