SICKOS: 1.2 Walkthrough π€
Table of Contents
Description :
This is second in following series from SickOs and is independent of the prior releases, scope of challenge is to gain highest privileges on the system.

Nmap Scan :
Output :

Use whatweb :

Open the IP in browser :

Use Dirb to look for hidden objects :
You will find /test.
Use http-methods.nse :
Finds out what options are supported by an HTTP server by sending an OPTIONS request. Lists potentially risky methods.
Copy php-reverse-shell so that we can use it :

Upload that php-reverse-shell using curl (change IP (your IP) and port (443)) :

You will see that our exploit is uploaded :

Set a netcat listener and open the exploit in the browser :

Set a nc listener in new tab :

Make an exploit :

Give it executable permissions :

You will get be root in the new shell :

Thanks for reading this post, if you like my work you can support by buying me a pizza. π
Read other posts