This article details a comprehensive penetration test on a simulated scammer’s website, highlighting techniques such as web enumeration, SMB share discovery, credential decoding, and exploiting vulnerabilities using Metasploit. It demonstrates how attackers can escalate privileges to obtain root access. #SubrionCMS #Metasploit
Keypoints
- Initial recon involved aggressive Nmap scans to identify open services like SSH, Apache, and SMB.
- SMB shares were enumerated, revealing a share containing a file with credentials.
- Web directory scanning confirmed the presence of vulnerable Subrion and WordPress applications.
- Exploitation of a known vulnerability in Subrion CMS v4.2.1 granted remote code execution via file upload.
- Privilege escalation was achieved by exploiting misconfigured sudo permissions, leading to root access.