Voyage Tryhackme Writeup

Voyage involves exploiting web vulnerabilities, container pivoting, and Docker escape techniques. The process includes reconnaissance with Nmap, CMS enumeration, exploiting insecure deserialization, and abusing Linux capabilities for privilege escalation. #CVE-2023-23752 #DockerEscaping

Keypoints

  • Initial network reconnaissance is performed using Nmap to identify open ports and services.
  • The target runs Joomla 4.2.7 with reported vulnerabilities, including access control issues.
  • Insecure deserialization via Python’s pickle allows remote code execution (RCE), leading to container compromise.
  • Docker vulnerabilities, particularly the cap_sys_module capability, can be exploited to escape containers and gain host root access.
  • Privilege escalation is achieved by loading a custom kernel module and executing a reverse shell to obtain root access.

Read More: https://infosecwriteups.com/recon-728a9aad68a8?source=rssβ€”-7b722bfd1b8dβ€”4