The first thing that we are going to do is a nmap scan:
|
|
This is our output, we see that there are 3 ports open,
- ssh(useless for now)
- http
- 3306, which is used by MariaDB
The first thing that I am going to do is exploring the web page
After trying some thing, I cam accross the robots.txt directory:
|
|
This is the output.
For now I am going to ignore it.
Now I just started sqlmap with the request that I captured from the login form:
|
|
And then I ran ffuf for directory enumeration:
|
|
Ok, now that I have more informations, I can visit the administrator page:
Nice, we have the jomla login panel.
Now we can run OWASP joomscan, and find the version.
After that I searched for an exploit, and found this python script:
|
|
After finding the hash of Jonah, I just went to hashidentifier and cracked it.
Now for creating a reverse shell I found this Article online: https://www.hackingarticles.in/joomla-reverse-shell/
I followed and I got a rev shell.
I upgraded the shell using:
|
|
And found the jjameson’s password inside linpeas.
Now we need to become root.
I used sudo -l to list all the privileges:
|
|
And then went to gtfobins and used this for a root shell:
|
|