πͺOpacity
License
0 - Introduction
1 - Scanning
1a - Ports
1ai - Discovery
βββ(kaliγΏkali)-[~]
ββ$ sudo nmap -sS -T5 -p- 10.10.148.146
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-26 17:56 EEST
Nmap scan report for 10.10.148.146
Host is up (0.12s latency).
Not shown: 65531 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 253.34 seconds1aii - OS Fingerprinting, Service and Version Detection
1b - Directory busting
2 - Website - /cloud/
2a - Probing





2b - Sending the payload




2c - Foothold


3 - Horizontal privilege escalation
3a - Finding and exfiltrating a Keepass database
3b - Cracking the database's password

3c - Getting our first flag
4 - PrivEsc
4a - Setting SUID bit to /usr/bin/find
4b - Voila! Final flag

Last updated