root@rumais:~# inspect lazyadmin

Lazy Admin

Linux room covering service enumeration, initial access, and privilege escalation. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.

Room Details

Built from supporting notes and artifacts. This room is grouped under Linux and PrivEsc.

Linux and PrivEsc 1 docx note 1 command artifact

Summary

Lazy Admin usually starts with CMS enumeration and weak credential handling, then transitions into Linux shell access and a straightforward local privilege-escalation path using exposed scripts, writable files, or sudo misconfiguration.

CMS enumeration credential recovery Linux foothold local misconfiguration abuse

Notes

Recon

  • Web enumeration reveals the hidden CMS path quickly, and further content discovery exposes backup and include directories that leak credential material.
  • The room rewards directory discovery more than exploit spraying; the data is already present if the paths are found.

Initial Access

  • The exposed backup data yields the administrative credentials for the CMS.
  • After logging into the management panel, the intended path is to upload or place a PHP reverse shell and convert application access into a Linux shell.

Privilege Escalation

  • Once on the host, the privilege-escalation route depends on local scripts, weak trust boundaries, or sudo-assisted execution.
  • The room is designed to show how quickly a “small” CMS issue becomes full compromise when secrets are exposed.

Security Notes

  • Backup files inside the web root are effectively credential disclosure.
  • CMS admin panels should never have the ability to drop executable content without strict controls.
  • Web compromise plus weak local execution rules is enough for total host loss on small Linux deployments.

    Collected Output

nmap-initial

# Nmap 7.91 scan initiated Thu Jun 24 11:13:29 2021 as: nmap -sV -sC -oN nmap-initial 10.10.114.184
Nmap scan report for 10.10.114.184
Host is up (0.47s latency).
Not shown: 998 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 49:7c:f7:41:10:43:73:da:2c:e6:38:95:86:f8:e0:f0 (RSA)
|   256 2f:d7:c4:4c:e8:1b:5a:90:44:df:c0:63:8c:72:ae:55 (ECDSA)
|_  256 61:84:62:27:c6:c3:29:17:dd:27:45:9e:29:cb:90:5e (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu Jun 24 11:15:27 2021 -- 1 IP address (1 host up) scanned in 118.18 seconds