SHOCKER
- Layout for this exercise:

1 - INTRODUCTION
- The goal of this exercise is to develop a hacking process for the vulnerable machine Shocker, what is a retired machine from the Hack The Box pentesting platform:
https://www.hackthebox.eu
2 - ENUMERATION
- Shocker's IP is 10.10.10.56:

- Scanning with Nmap:

- Scanning deeper ports 80 and 2222:

- Connecting with the browser:

- Dirbusting the web server we find a /cgi-bin folder:

- Dirbusting specifically /cgi-bi for extensions .php, .txt and .sh:

- Downloading user.sh:


3 - EXPLOITATION
- The vulnerability CVE-2014-6271 explains how to exploit the mod_cgi and mod_cgid modules in the Apache HTTP Server:

- We will follow to ways to exploit the vulnerable machine Shocker:
3.1 - Python exploit
- This Python exploit provides a remote shell, just setting up some parameters as explained at the instructions:
https://www.exploit-db.com/exploits/34900


- Copying the exploit locally and giving execution permissions:


- Providing these parameters and running the exploit:
- payload=reverse
- RHOST=10.10.10.56
- LHOST=10.10.14.22
- LPORT=4321
- pages=/cgi-bin/user.sh



3.2 - Metasploit
- There is a Metasploit module associated with this vulnerability (also known as Shellshock):

- Launching Metasploit and using this module it is easy to get a Meterpreter session:

- Spawning a shell:

4 - CAPTURING THE 1st FLAG
- Reading user.txt:

5 - PRIVILEGE ESCALATION
- We are lucky because current user shelly has very powerful sudoer privileges:


- Now user shelly is able to run a Perl script (as root) that yields a root shell:

6 - CAPTURING THE 2nd FLAG
- Reading root.txt:
