DC-1 Mukesh
DC-1 Mukesh
target ip — 192.168.0.109
When we access the web service we find that the server is running Drupal CMS. As the target
system is running Drupal CMS, we can check if it is vulnerable to Drupalgeddon2 exploit.
We run the exploit using Metasploit on the target machine and successfully able to get a
reverse shell.
using Metasploit
use #1 : exploit/unix/webapp/drupal_drupalgeddon2
set the RHOSTS
we got
our flag2 :)
use drupaldb;
show tables;
search for users in table
Well, Drupal is also known to have very secure hashes. Are they secure enough? I let my
1070 TI GPU determine that. I downloaded hashcat to my Windows PC and the
rockyou.txt word list.
I didn’t have to wait too long for the admin’s password. The password was 53cr3t. I logged
in and under the content menu, I found the third flag.
For Flag4 we have to go to home directory
and we got our Flag4 :) . From the hint , it seems like we have to check root directory for
FLAG5 .
to check if
we got root permission or not , type whoami
we got it :)
Now at last , go to root directory and access the FLAG5
And its done , the 5th flag was the Final Flag .