Bolt
Last updated
Last updated
Reconnaissance
nmap
Exploitation
metasploit (bolt cms)
Capturing the flag
flag.txt
From the nmap scanning. I found that 3 port open. Which is
22 (ssh)
80 (http)
8000
I browse the given IP address.
Scroll this page you will get username and password.
But, with this credentials, I still can't access SSH.
So, we find information about this CMS and it's vulnerability. Maybe we can exploit it.
Bolt CMS Version.
Fire up Metasploit (msfconsole).
show options and set.
Yesss, root already. Find your flag and grab it :)
CONGRATULATIONS!!
This was a fun machine. Very basic yet fun to root. Good for beginner.
Thank you for reading. :)
By AdaniKamal
that I found.