# nineveh
## port scan

## Check port 80 and 443 but there are no useful information(either in the source code)


## Use gobuster to enumerate pages on port 80 and port 443

## Page department I test is there SQL injection exploit the answer is no

## But we can see that error message give us some feedback(it says invalid password which means username is right)

## I test admin admin get this result,so we can enumerate password of the username admin(by hydra)
## Then we can login into the page

## There is a LFI exploit ,but right now I don't have any files can be used by this exploit

## Go to page db we also can use hydra to enumerate password

## We can look for phpLiteAdmin v1.9 in exploit-db and use one of those exploits we find(we can use this exploit to execute php code)

## I use php code to execute command

## Then use command to get reverse shell

## we can find some keywords from /report Folder then search it in google then we can find another keyword chkrootkit
## Looking for some exploits of chkrootkit ,use it,finally we get root
