PC
Was this helpful?
Was this helpful?
nmap -p- 10.10.11.214 -Pn
A google search for port 50051 reveals that this port is generally used for gRPC.
Following blog post I can start to find out how to enumerate gRPC.
Using we can see that there is a service called SimpleApp running
and that the app has 3 pages.
If we try to use the getInfo option we get the following output
so, we may need to use the RegisterUser and then LoginUser functions to get our token
if we try to make a user with the name admin
we get an error saying that the user already exists, however, we can use the credentials admin:admin
with the LoginUser function and generate a token. taking note of the id and token we are given, let's use them with the getInfo function and see what we get
let's try some other numbers like, 1
time to do some research
sqlmap -r req.txt -dbs --batch
sqlmap -r req.txt --tables --batch
sqlmap -r req.txt -T accounts --batch --dump
We can use the credentials sau:HereIsYourPassWord1431
to ssh into the machine for the user flag
Running a command to check for SUID binaries: find / -type f -perm -04000 -ls 2>/dev/null
we can see that bash
is there. so simply run /usr/bin/bash -p
for root!
now let's use to have a web ui for the application
talks about how SQLi might be a vulnerability when dealing with gRPC, so let's capture a request to a call to the getInfo function using BurpSuite and see if sqlmap can do anything for us.