[VulnHub]DC:3 WriteUp
I pwned dc:3 machine today. And We will see my writeup about that.
Tools
- netdiscover
- nmap
- joomscan
- searchsploit
- sqlmap
- john
- nc
Steps
I started find target ip with netdiscover -r 192.168.1.0/24 .
My network adapter was in bridged mode .

And I did nmap searching for see which ports and service work . It was just one port open and work in joomla.

I saw the tool first time . It is usefull tool I liked.
And I used the tool joomscan --url http://192.168.1.104 .
I detected joomla version and started search the verison for might have vulns.

I did searchsploit searching and saw an exploit .

I saw sqlmap query when read the txt file . I started work with sqlmap changed address .

I found 5 databases . I selected joomladb database .

And started to find tables after add -D joomladb --tables line in sqlmap query .
I was hope to see an user table and it happened .

I found admin creds after that I started to crack the hash with john .

I cracked the hash before take screenshot so it didnt show this time . Result is snoopy .

I went to admin panel and logon with creds .

I went to templates/beez3/error.php directory for upload reverse shell.
I changed error.php contents .

And I did a request use with the page for reverse connection.

My listener already was working .I got connection .

I started to enumerate os . I saw ubuntu version.

I searched the version and found many things but I was need to select one .And
I select 39722.txt . And I read the file for exploit.

I was need to download the zip file.I extracted the files for download target machine .

I pulled the files with wget .I started with compile.sh file .And I saw new files after that .

And in the last step doubleput file worked for get root and read final flag.

Summary:
I liked the box.I absoultly recommended to you solve on your own. Have a good hacks .See you next machines :)
by Ghroot