Banzai (WIP)
Last updated
Last updated
SMTP is open on the host. Bruteforcing smtp-user-enum
reveals the following:
The user admin is not a default user on Linux / Unix systems. We can attempt to bruteforce this against relevant services starting with FTP.
We receive no hits with Hydra after 30 minutes.
However, trying with the mirai password list provides success on admin:admin
.
Logging in with FTP appears to show the root directory for the webserver. Knowing this we can upload a reverse shell. A PHP shell will be sufficiant as we can tell from the listing PHP is supported.
Using the PUT command we can upload a webshell then browse to it to access: http://192.168.233.56:8295/webshell.php
A Python reverse shell was then executed on the webshell pointing back to a listener on port 21 to gain a full shell.