Reconnaissance
First, I added the new host to my known ones:
Then I performed an Nmap scan:
Seems to be something related to Minecraft :)
So I decided to check the website:
The website seems to be running Wordpress, so I decided to run wpscan:
Inspecting the website I found a user called โnotchโ:
โWordPress version 4.8 identified (Insecure, released on 2017-06-08)
โ, so I searched for an exploit for that version, but without success.
So I decided to use dirsearch ๐ to enumerate further:
I decided to check the /plugins
directory (which is not the same as the Wordpress plugins directory):
Two .jar
files were found.
Exploitation
So I downloaded and inspected BlockyCore.jar with jadx-gui:
So weโve got mysql database credentials!: root:8YsqfCTnvxAUeduzjNSXe22
I decided to try that password with the previously found username โnotchโ.
It worked, so I found user flag!
Privilege escalation
If we run id
we can see that the user is part of the sudo
group, so we can become root easily with his password and get root flag:
Machine pwned!