Read my writeup to Topology machine on:
TL;DR
To solve this machine, we start by using nmap
to enumerate open services and find ports 22
, and 55555
.
User: Discovered request-baskets
running on port 55555
. Leveraging CVE-2023-27163
, a new basket was created with forwarding to local port 80
for Maltrail
. Exploiting unauthenticated OS Command Injection on Maltrail
, a reverse shell was successfully obtained as user puma
.
Root: After executing sudo -l
, we discovered that we have the ability to run the systemctl status
command as root
. By utilizing the !sh
command within the less
pager, we successfully obtained a root
shell.