SMAG GROTTO
scanning
furious 22,80 10.10.173.35
nmap -sC -sV -p 22,80 10.10.173.35 -oN targeted

80
wfuzz -c --hc 403,404 -t 100 -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt http://10.10.173.35/FUZZ

we download the pcap file

We found 4 things
- A login page: login.php
- hostname: development.smag.thm
- username: helpdesk
- password: cH4nG3M3_n0w

So we modify the hosts file in our machine to enter to the login page and use the credentials we found.

we make a reverse shell in php to conect, so we have to wait with:
nc -lvp 4545


We are going to change the file to enter to the user jake.

sudo ssh -i /.ssh/id_rsa jake@10.10.30.100
cat /home/jake/user.txt

we use the following commands
