In this video-walkthrough, we demonstrated Content management system exploitation, namely Cockpit, and privilege escalation on Exiftool.
This is a machine that allows you to practise web app hacking and privilege escalation using recent vulnerabilities.
You’ve identified that the CMS installed on the web server has several vulnerabilities that allow attackers to enumerate users and change account passwords.
Your mission is to exploit these vulnerabilities and compromise the web server.
What is the version of the Content Management System (CMS) installed on the server?
What is the path that allow user enumeration?
How many users can you identify when you reproduce the user enumeration attack?
What is the path that allows you to change user account passwords?
Compromise the Content Management System (CMS). What is Skidy’s email.
What is the web flag?
Compromise the machine and enumerate collections in the document database installed in the server. What is the flag in the database?
What is the CVE number for the vulnerability affecting the binary assigned to the system user? Answer format: CVE-0000-0000
What is the utility used to create the PoC file?
Escalate your privileges. What is the flag in root.txt?