Bolt
Last updated
Last updated
Reconnaissance
nmap
Exploitation
metasploit (bolt cms)
Capturing the flag
flag.txt
From the nmap scanning. I found that 3 port open. Which is
22 (ssh)
80 (http)
8000
I browse the given IP address.
Scroll this page you will get username and password.
But, with this credentials, I still can't access SSH.
So, we find information about this CMS and it's vulnerability. Maybe we can exploit it.
Bolt CMS Version.
Exploit that I found.
Fire up Metasploit (msfconsole).
show options and set.
Yesss, root already. Find your flag and grab it :)
CONGRATULATIONS!!
This was a fun machine. Very basic yet fun to root. Good for beginner.
Thank you for reading. :)
By AdaniKamal