Make sure to Connect to TryHackMe’s VPN
First, Let’s Inspect the Website for any clues!
On Seeing the website, we can find that the website uses Fuel CMS
Ans: Fuel CMS
2. What is the version number of this application?
Ans: 1.4
3. What is the number of the CVE that allows an attacker to remotely execute code on this application?
Let's google about fuel cms 1.4
We have found that the CVE is about Remote Code Execution
Ans: CVE-2018-16763
4. Use the resources & skills learnt throughout this module to find and use a relevant exploit to exploit this vulnerability.
Note: There are numerous exploits out there that can be used for this vulnerability (some more useful than others!)
Let’s use Searchsploit to find another exploit
So Let’s Exploit the Vulnerability!!
After some research I found Errors on the Python File Mentioned above so I Just added another file below which can be used to exploit the Vulnerability for Remote Code Execution
2. Run the Above Python File as follows below
python3 fuel_cms.py <THM-Machine-IP>
3. After that Enter your Machine IP and Listening Port
We got the Reverse Listener on our Terminal : )
Ans: THM{ACKME_BLOG_HACKED}