System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Follow publication

Member-only story

Archangel | LFI to RFI, Crontab Exploitation and PATH Manipulation

Onurcan Genç
System Weakness
Published in
11 min readDec 10, 2024

--

Greetings everyone, hope you are well. Today I had the opportunity to analyze Archangel, başmelek in Turkish from TryHackMe platform.

Add your ip address to hosts file to make customizable domain. This is a local method to override DNS resolution and create your own domain mappings for testing, development, or other purposes.

Run commands respectively

  • nano /etc/hosts
  • <ipv4 address> <customized domain name>
  • Control S and X

Final Result:

Reconnaissance

The faster you conduct reconnaissance, the more time you gain for the vulnerability detection and exploitation phases. Cyber intelligence is always a significant asset in understanding the technology an application uses and its vulnerability scope.

As penetration testers, we frequently seek to move directly to the vulnerability exploitation phase, but we should first gather information about the target, whether it involves application testing or local area network assessments. That’s why I conducted a curl scan to identify HTTP ports 80, 443, and Apache 8080. If further investigation is required, we should also perform a full-port scan. The technique I usually use is a demand-based approach, meaning we apply what is necessary based on the situation.

Let’s use curl:

curl -v cuneyt.sevgi

By default it will automatically move forward to port 80

There is nothing on other ports 443 and 8080:

Port 80 successfully identified web page's html structure and prompted as terminal output. Let me first analyze the source code's comment part and manually investigate with browser.

I saw an email address with domain @mafialive.thm as an internal information.

--

--

Published in System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Written by Onurcan Genç

Offensive Security Specialist | Tech Enthusiast Welcome to my playground !

No responses yet

Write a response