Kiba
Last updated
Last updated
Port 80 takes us to the following:
The sentance is a possible hint for later regarding capabilities. Otherwise I was unable to enumerate further interesting directories with Gobuster.
On port 5601 we have Kibana installed.
Checking the management pane shows we are running on version 6.5.4
Research related exploits we come across a RCE exploit that effect versions prior to 6.6.
As per the exploit head over to the Timelion pane in Kibana and paste the following payload:
Swapping out the IP and port where required.
Hit run and then proceed to the 'Canvas' pane. Shortly after we should recieve a shell back on our netcat listener.
From here we can check all capabilities with:
This reveals a python binary in /home/kiba/.hackmeplease. We can run the following command to launch a Python shell as root.