In the next phase, I looked at the current services and found the right exploit as the image shown below:
Press enter or click to view image in full size
The metasploit module seems a good match, after trying it it seems that this exploit isn’t a viable approach!
Join Medium for free to get updates from this writer.
it seems that the exploit not working through metasploit or maybe requires some modifications, however I stumbled upon this webpage after some googling and gained a foothold successfully!
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
lets keep going next for privilege escalation, it turns out and after some overthinking trying different methods for privilege escalation the PE Vector was actually simple which was weak root password.
the password for the root user was root.
Thanks for reading my write-up, stay tuned for the next ones!