Other access methods
To learn more about how the system works, and possibly other vectors of exploits, I decided to further explore the web application.
Brute forcing SSH password
As we have seen previously, there are 2 users that stands out in the /etc/passwd
file: joshua and charles. I attempted a password brute force attack on their SSH login with the wordlist from Metasploit /usr/share/wordlists/metasploit/unix_passwords.txt
:
$ hydra -l joshua -P <wordlist> -t 6 ssh://<host>
$ hydra -l charles -P <wordlist> -t 6 ssh://<host>

I found the password 123456 for both usernames joshua
and charles
. We can now SSH with the usernames and gain a remote shell:
$ ssh <user>@<host>
Last updated