Information
Room
- Name: Daily Bugle
- Profile: tryhackme.com
- Difficulty: Hard
- Description: Compromise a Joomla CMS account via SQLi, practice cracking hashes and escalate your privileges by taking advantage of yum.
Write-up
Overview
Install tools used in this WU on BlackArch Linux:
[Task 1] Deploy
Access the web server, who robbed the bank?
Answer: spiderman
[Task 2] Obtain user and root
What is the Joomla version?
Answer: 3.7.0
What is Jonah's cracked password?
Answer: spiderman123
What is the user flag?
Answer: xxx
The login page: http://10.10.48.170/administrator/
Replace a page of a template by a PHP reverse shell at: http://10.10.48.170/administrator/index.php?option=com_templates&view=template&id=506&file=L2Vycm9yLnBocA%3D%3D
Create the PHP reverse shell:
Start a listener:
Execute the reverse shell: http://10.10.48.170/templates/protostar/error.php
From the reverse shell:
What is the root flag?
Answer: xxx
Let's find a way to EoP with yum:
Install FPM:
Then prepare the exploit:
It created x-1.0-1.noarch.rpm
Serve it with a one line web server:
Then on the target: