Lab 10.2: Exploiting nancurunir
Target: nancurunir.shire.org
Target IP Address
Open Ports
Discovered Vulnerabilities
How you achieved a foothold
Phpmyadmin user password, password was shallnotpass
shallnotpassRoot user password:
Using 50457 to upload backdoor
Backdoor made
Back door uploaded
Connect to back door
Create a reverse shell in weevely:
How you achieved root/Administrative level compromise
Foot hold using the gandalf user:
User Flag
Root Flag
How might the vulnerabilities be mitigated by the system administrator?
Reflection
Report
Last updated