Nmap scan:
SMTP is open, which is rather suspicious. I connected via nc
and tested some default credentials, and found that root:root
worked.
Now that we are logged in, we can read some emails:
With this, we can SSH in as mindy
.
When in the user's directory, we find a restricted shell where we cannot execute a lot:
I researched a bit on how to escape this shell, and found that appending -t "bash --noprofile"
works:
We can run pspy32
on this machine to view processes:
I found that we have write access over this file, so we can just append a reverse shell to it:
After waiting for a bit, we would catch a reverse shell: