Writeup by wook413

Recon

Nmap

As usual, I started by performing three Nmap scans on this machine. First, a full port scan to identify all open ports; second, a service version detection and default script scan on the discovered ports; and finally, a scan of the top 10 UDP ports.

Initial Access

FTP 21

The FTP server allowed anonymous login, but it hung at ‘Entering Extended Passive mode’.

SMB 139 445

Nmap smb-enum-shares scripts revealed the existence of IPC$ and print$ shares, and that anonymous access has READ and WRITE permissions on IPC$ .

I tried connecting to both shares using smbclient, but I was unable to connect to the print$ share and the IPC$ share was empty.

RPC 111

I also tried a Null Session with rpcclient , but it failed.

HTTP 80

Whenever I see HTTP services running, I run Nmap http-enum scripts first for quick wins, but this time it didn’t yield much information.

The page on port 80 was just a test page, and directory brute forcing didn’t reveal any useful information either.

image-20260210220803104

HTTPS 8081

Moving on to port 8081, HTTPS is required.

image-20260210220810665

The service on port 8081 is actually rConfig v3.9.4

image-20260210220818550

Looking up the service version on Searchsploit revealed RCE vulnerabilities.

I modified the code, executed it and successfully obtained a reverse shell as apache user.

Shell as apache

Found local.txt

Privilege Escalation

During manual enumeration, I found that the find binary has the SUID bit set, which is very unusual. I referred to GTFOBins to exploit it and successfully gained a root shell.

Found proof.txt