Exploitation 6

This challenge requires us to get shell access to the server.

Based on our enumeration using Ridgebot, one of the vulnerabilities of the server is Shellshock Remote Code Execution (CVE-2014-6271).

Description: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka 'ShellShock.'

I use ngrok since I don't have any VPS to create a tunnel to my kali machine.

I replace the payload with one-liner reverse shell

I prepare my netcat listener, then I hit enter then I got a reverse shell connection

Inside the server, I found the image which contains the flag

Flag: RC15{sXpbTeFkvtXALSTpT2Fd866774kA5kzp}

Last updated