# PGP Writeups: Detection IP Addr: 192.168.154.97 ## Pre-attack Prep  - 3 Folders - enum → for all records we enumerate - files → for any files we find - exploits → for any exploits we might need ## Initial Scan `sudo nmap 192.168.154.97 -p- -Pn -A -T4 -oN enum/97-ports.log` ```shell 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 62:36:1a:5c:d3:e3:7b:e1:70:f8:a3:b3:1c:4c:24:38 (RSA) | 256 ee:25:fc:23:66:05:c0:c1:ec:47:c6:bb:00:c7:4f:53 (ECDSA) |_ 256 83:5c:51:ac:32:e5:3a:21:7c:f6:c2:cd:93:68:58:d8 (ED25519) 5000/tcp open upnp? | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | Content-Type: text/html; charset=utf-8 | Content-Length: 22939 | Vary: Accept-Encoding, Cookie | Set-Cookie: session=eyJjc3JmX3Rva2VuIjoiZWE4MmRlMThiODAwYzU3YTA4NDM0Y2EzNzk4OWFmMTNhNmY4YTFhMSJ9.Z7xBEA.BcKYHheo3y8WjLIxIEQ7QFuH-T4; HttpOnly; Path=/ | Date: Mon, 24 Feb 2025 09:51:12 GMT | Connection: close | <!DOCTYPE html> | <html lang="en" data-darkmode="false"> | <head> | <meta charset="utf-8" > | <meta name="viewport" content="width=device-width, initial-scale=1.0" > | <meta name="description" content="Self hosted website change detection." > | <title>Change Detection</title> | <link rel="alternate" type="application/rss+xml" title="Changedetection.io | Feed" href="/rss?tag=&token=766c79a538cb617cfcf10f946ff18b94" > | <link rel="stylesheet" href="/static/styles/pure-min.css" > | <link rel="stylesheet" href="/static/styles/styles.css" > | <link rel= | RTSPRequest: | <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" | "http://www.w3.org/TR/html4/strict.dtd"> | <html> | <head> | <meta http-equiv="Content-Type" content="text/html;charset=utf-8"> | <title>Error response</title> | </head> | <body> | <h1>Error response</h1> | <p>Error code: 400</p> | <p>Message: Bad request version ('RTSP/1.0').</p> | <p>Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.</p> | </body> |_ </html> Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel ``` It appears that we have a webserver running on port 5000  ## Webserver `gobuster dir -u http://192.168.154.97:5000 -w /usr/share/dirb/wordlists/common.txt`  ### Manual Enumeration #### Main Page ChangeDetection.io v0.45.1 #### /backup Downloads a file to our machine  #### /import  #### /login  #### /settings - We find some interesting things here API Key → f7fb037bd530a6579c7a42df63fdd25a  ## Enumeration  - we find an exploit to do with this service  ## Exploitation  - we have a few modules missing Enable virtual environment and install    Give the necessary arguments  Note the new entry at bottom of table  Click edit, and look in notification body   Click save  We have root!  
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up