Vulnerability Capstone
February 27, 2024
Last updated
February 27, 2024
Last updated
Task 1: Introduction
Task 2: Exploit the Machine (Flag Submission)
First once we launched the machine we will visit their webpage
Just by viewing the html page the web application that is being used here is "Fuel CMS" and its version is 1.4.
The first thing that i had in my mind is that I will search for a exploit that is related to that web application and its version. Then after few searches in the google I found this RCE for the Fuel 1.4.
I just download the raw code
Now I will save the raw code to exploit.py and run it with an active netcat listener in port 4444