Messiah Walkthrough

We start by scanning the host with nmap -A -T4 -p- 192.168.1.17 -vv

We scan port 80 with dirb http://192.168.1.17 /usr/share/dirb/wordlist/big.txt

We got 2 important things, first the robot.txt file and an image, the robot.txt file:

The text is encoded in 64code and we can decrypt it easy:

The second thing is the image:

Well i know this is Neymar but it looks like he’s in some kind of ma movie or something, so after a while i decided to do Image Searching using this site tineye.com i uploaded the image and i got a result, turns out he’s a star in money heist (which still in my Netflix list).

So i made a list of most of the cast of the show as a users.txt file to run it against the ssh service:

Then i used MetaSploit auxiliary/scanner/ssh/ssh_enumusers and i found some results

Tried the 3 of them then the one that worked is “gandia” and then ssh gandia@192.168.1.17

And i was in, now let’s so what do we have here:

I transferred the file to my machine and extracted it and i found this file:

After switching to Professor here is the sudo privilege:

Ok what we need to do is create a file with the name “execute” with bash and run it:

Using “nano” we create the file “execute” and write inside it, then save it and run it:

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s