# Curling!
## @Author : M3tr1c_r00t

### Enumeration
We run an nmap scan and find we have two ports that are open...

Lets move to firefox and check out the site...

Note that after the article for 2018, there's a name :_floris_ maybe its a username?
Running a gobusterscan we find some interesting directories...

I ran the gobuterscan again using -x txt,php and found a file: **secret.txt**

It was hashed in base64.

On decrypting, we find a credential which seems to be a password...
On the joomla login page, we try the username as _floris_ and the password as _Curling2018!_ and it works!
We also see something interesting at the bottom right corner of the site. Its the joomla version. _**Joomla 3.8.8**_
After a bit of googling, we find out that the joomla version has a vulnerability that allows for RCE... via the templates and can help us to get a reverse shell

I chose the B33z template and modified the index.php file

You can use the phpreverseshell from pentestmonkey

and make sure to change the LHOST and LPORT ....

Set up a listener and run go to the index file and boom!
You get your reverse shell....

Although we have the rev shell, permissions were limited. I ran linpeas and find the pwnkit vulnerability

After uploading the python script, run the file and you get root.

Now you can get your user and root flags!
And done!
### Socials
@Instagram:https://instagram.com/M3tr1c_r00t
<br>@Twitter:https://twitter.com/M3tr1c_root