Daily Bugle is a hard-rated room featuring Joomla CMS exploitation via SQL injection, hash cracking, and yum privilege escalation. Named after Spider-Man's newspaper, this box teaches advanced enumeration and exploitation.
This room requires patience with SQLMap and understanding of CMS vulnerabilities. J. Jonah Jameson would be furious about these security holes!
Reconnaissance
Start with comprehensive service enumeration:
The website is running Joomla CMS. Let's identify the exact version:
Joomla SQL Injection
Joomla 3.7.0 is vulnerable to CVE-2017-8917 - SQL injection in the com_fields component. This affects the core CMS, not a plugin!
SQLMap Tips
SQLMap can take a long time. Use --threads=10 to speed up, but be careful not to crash the target. The #__users table contains admin credentials!
From the dump, you'll find:
Hash Cracking
Bcrypt hashes are slow to crack by design. This can take several minutes even with a good GPU. Perfect time to grab coffee!
Getting a Shell
Joomla Admin to Shell
1
Login to Admin PanelAccess /administrator and login with jonah:spiderman123
2
Navigate to TemplatesExtensions → Templates → Templates
3
Edit Template FileSelect Protostar → error.php (or index.php)
4
Inject Reverse ShellReplace content with PHP reverse shell
5
Trigger ShellVisit a non-existent page to trigger error.php, or visit /templates/protostar/index.php
Lateral Movement
The apache user has limited privileges. Look for credentials:
Privilege Escalation - Yum
GTFOBins
Always check GTFOBins for sudo binaries. Yum has a well-documented privilege escalation path using custom plugins.
Knowledge Check
Key Takeaways
- Joomla version detection reveals exploitable vulnerabilities
- CMS admin panels allow template editing for shell injection
- Configuration files often contain reusable passwords
- Package managers (yum, apt) with sudo can be exploited via plugins
- GTFOBins is essential for sudo privilege escalation research