MonitorsTwo writeup by evyatar9

Read my writeup to MonitorsTwo on:

TL;DR

User: Found Cacti Version 1.2.22 and used CVE-2022-46169 to acquire a reverse shell as www-data. Discovered the SUID file capsh and gained a root shell inside the container using capsh --gid=0 --uid=0 --. Found the /entrypoint.sh file containing the database (DB) credentials. Identified the hashed password of marcus in the DB. Successfully cracked the hash using john and employed the obtained password to establish an SSH connection as marcus.

Root: Based on an email received from administrator@monitorstwo addressed to marcus it is indicated that the vulnerability CVE-2021-41091 was exploited to obtain a root shell.