SAR: 1 — Walkthrough

@fuffsec
Jul 12, 2021

Sar is an OSCP-Like VM with the intent of gaining experience in the world of penetration testing.

Enumeration

only one service is running
we know that it is using php
got sar2html dir by looking into the robots.txt

Exploitation

sar2HTML Ver 3.2.1

Let’s search for any available vulnerabilities.

  • I used wget to get my shell into the webserver and ran it to get reverse shell.

Privilege Escalation

After becoming www-data, let’s run the linpeas

found this….. ;p

edited(chmod +s /bin/bash) the write.sh and got a shell.

Photo by Lidya Nada on Unsplash

--

--

@fuffsec

Security Researcher | (OSWE, OSCP, OSWA, OSWP, CRTP, eWPTX, SSCP)