Simple ctf
Enumeration:
nmap scan results:
gobuster result:
/simple implements cms 2.4.8 which is vulnerable to sql injection based attack CVE-2019-2053 exploit link modifying the cve to run on python3 not just on python now running the exploit python3 -u http://10.10.172.2/simple which starts bruteforcing
running ssh to user mitcuL at port 2222 did not let us log becaus eof the incorrect exploit i ran the correct exploit and got this
[+] Salt for password found: 1dac0d92e9fa6bb2 [+] Username found: mitch [+] Email found: [email protected] [+] Password found: 0c01f4468bd75d7a84c7eb73846e8d96 which gave me the password secret
0c01f4468bd75d7a84c7eb73846e8d96
again this command did'nt run this ran and gave me root accessrootflag: W3ll d0n3. You made it!