PC

Recon

nmap_scan.log

GRPC (50051)

The only port that's open on the box is 50051, which is default for GRPC servers.

grpcurlarrow-up-right can be used to interact with the service.

getInfoRequest is somewhat troublesome, we need a token but we are only given id...

If we supply -v (verbose) flag we should get more output and there's the token.

The only output getInfo returns is message: "Will update soon." and not much to go on..

The token died in few minutes so just automate the process, last url is somewhat dynamic so I left it as echo

SQLi is possible in the ID field

https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/SQLite%20Injection.md#sqlite-stringarrow-up-right

SSH (22)

Creds: sau:HereIsYourPassWord1431

User.txt

Privilege Escalation

Some internal application called pyLoad is running on port 8000 as root.

Writeup.png

PyLoad 0.5.0 - Pre-auth Remote Code Execution (RCE)arrow-up-right

Writeup-1.png

Exploit works.

Root.txt

Last updated