Boltarrow-up-right
Reconnaissance
nmap
Exploitation
metasploit (bolt cms)
Capturing the flag
flag.txt
From the nmap scanning. I found that 3 port open. Which is
22 (ssh)
80 (http)
8000
I browse the given IP address.
Scroll this page you will get username and password.
But, with this credentials, I still can't access SSH.
So, we find information about this CMS and it's vulnerability. Maybe we can exploit it.
Bolt CMS Version.
Exploitarrow-up-right that I found.
Fire up Metasploit (msfconsole).
show options and set.
Yesss, root already. Find your flag and grab it :)
CONGRATULATIONS!!
This was a fun machine. Very basic yet fun to root. Good for beginner.
Thank you for reading. :)
By AdaniKamal
Last updated 1 year ago
nmap -sV 10.10.54.254