Data (easy)

port scan

service enumeration

on port 3000. we have Grafana

exploit grafana

CVE-2021-43798 give us access to read local file

we can use searchsploit -m 50581

we can change this exploit write out to file

or just use curl command

crack grafana user password

the cred is beautiful1

ssh

we can use cracked password ssh into target

Privilege Escalation

we can use /snap/bin/docker exec * with root privilege

and there have a disk /dev/xvda1. we can mount it to access host file system

Last updated