Bolt

🔗 Link
Penetration Testing Methodology
Reconnaissance
nmap
Exploitation
metasploit (bolt cms)
Capturing the flag
flag.txt
Walkthrough
nmap -sV 10.10.54.254

From the nmap scanning. I found that 3 port open. Which is
22 (ssh)
80 (http)
8000
I browse the given IP address.

Scroll this page you will get username and password.


But, with this credentials, I still can't access SSH.
So, we find information about this CMS and it's vulnerability. Maybe we can exploit it.

Bolt CMS Version.
Exploit that I found.

Fire up Metasploit (msfconsole).

show options and set.


Yesss, root already. Find your flag and grab it :)

CONGRATULATIONS!!
This was a fun machine. Very basic yet fun to root. Good for beginner.
Thank you for reading. :)
By AdaniKamal
Last updated