lambda.de
nmap -A -v -p- gives
```
Nmap scan report for lambda.de (218.101.64.66)
Host is up (0.00027s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.5p1 Debian 6+squeeze5 (protocol 2.0)
| ssh-hostkey:
| 1024 ea:1d:70:bd:d6:4d:81:ee:60:f4:a8:68:8f:ef:eb:b2 (DSA)
|_ 2048 8a:e6:87:ec:b2:27:b9:3d:da:d2:fc:0e:b3:78:80:87 (RSA)
25/tcp open smtp Microsoft Exchange smtpd
| smtp-commands: site-smtp.lambda.de Hello [208.200.200.10], SIZE 36700160, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, X-ANONYMOUSTLS, AUTH, X-EXPS NTLM, 8BITMIME, BINARYMIME, CHUNKING, XEXCH50, XSHADOW,
|_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
| ssl-cert: Subject: commonName=site-smtp
| Subject Alternative Name: DNS:site-smtp, DNS:site-smtp.lambda.de
| Issuer: commonName=site-smtp
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha1WithRSAEncryption
| Not valid before: 2022-03-08T02:11:48
| Not valid after: 2027-03-08T02:11:48
| MD5: d58c 2a41 a6c1 a77e dea8 8f6f 55fe 0cef
|_SHA-1: 2793 f4ad 81ea d961 b4d5 a4de d1fa e2dc 7f7c 2041
|_ssl-date: 2022-03-19T13:07:24+00:00; +2s from scanner time.
80/tcp open http Apache httpd 2.4.6 ((CentOS) PHP/5.5.38)
| http-methods:
| Supported Methods: OPTIONS GET HEAD POST TRACE
|_ Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.6 (CentOS) PHP/5.5.38
|_http-title: Ontario Election Services » Vote Now!
8080/tcp filtered http-proxy
Service Info: Host: site-smtp.lambda.de; OSs: Linux, Windows; CPE: cpe:/o:linux:linux_kernel, cpe:/o:microsoft:windows
```
```
65.61.65.66 datasafe.votenow.local
```
This gives us acess to a phpmyadmin thing that we can most probably explot
https://www.exploit-db.com/exploits/50457 Most probably this according to the stream
curl http://65.61.65.66/config.php.bak
EXPLOIT PROPOSAL
CURL NEW PASSWORD -> use exploit-db.com to get acess -> change flag value to our