PC writeup by evyatar9

Read my writeup to PC macine on:

TL;DR

User: Scanning all ports revealed that port 50051 is open. Enumeration confirmed that the service running on this port is gRPC. Utilized POSTMAN to send requests and discovered a vulnerability in the getInfo method, specifically a SQLite injection. Exploiting this vulnerability allowed to obtain the credentials of the sau user.

Root: During the network analysis, a thorough examination using the netstat command revealed the presence of a local port 8000 which was identified as the hosting point for pyLoad. Through the establishment of a secure tunnel to this port, an exploit known as CVE-2023-0297 was employed to successfully gain remote code execution (RCE) privileges with root access.