Pandora - HackTheBox
Pandora Machine(10.10.11.136)  Info:  This was an easy machine from HackTheBox, where i first  time encountered SNMP. Then we had to exploit PandoraFMS, most  interesting part of box, to get further control and PATH hijacking for  privilege escaltion. Nothing too fancy still teaches a lot about manual  testing.   Recon:  Starting with port scan, we get two open ports.  $ nmap -T4 10.10.11.136 Starting Nmap 7.80 ( https://nmap.org ) at 2022-05-18 21:11 IST Stats: 0:00:26 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan Connect Scan Timing: About 85.17% done; ETC: 21:11 (0:00:05 remaining) Nmap scan report for 10.10.11.136 Host is up (0.50s latency). Not shown: 998 closed ports PORT   STATE SERVICE 22/tcp open  ssh 80/tcp open  http  $ nmap -A -p22,80 -T4 10.10.11.136 Starting Nmap 7.80 ( https://nmap.org ) at 2022-05-18 21:12 IST Nmap scan report for 10.10.11.136 Host is up (0.38s latency).  PORT   STATE SERVICE VERSION 22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (U...