Welcome to the Exploitation CTF 1 lab in the eJPT course. Let’s get started!

Attacker IP: 192.6.156.2

Target IPs: target1.ine.local - 192.6.156.3

                target2.ine.local - 192.6.156.4

Credentials: admin:password1

Ok so per the task we’re going after a web app and are provided with some credentials for later. Let’s run our nmap scan and get started.

nmap -sV -sC 192.6.156.3

Starting Nmap 7.94SVN ( <https://nmap.org> ) at 2026-01-14 02:55 IST
Nmap scan report for target1.ine.local (192.6.156.3)
Host is up (0.000026s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION

22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 21:24:4c:9e:7b:6b:7f:b9:ff:35:fd:b7:72:e9:b3:c2 (RSA)
|   256 32:b1:fc:9d:50:e4:3c:28:ee:18:16:2f:73:91:0a:13 (ECDSA)
|_  256 e0:51:b7:4f:d0:b1:a3:35:88:5b:51:4e:b9:53:59:1a (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
|_      httponly flag not set
|_http-title: Homepage
| http-robots.txt: 4 disallowed entries 
|_/acp/ /core/ /lib/ /modules/
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-generator: flatCore

MAC Address: 02:42:C0:06:9C:03 (Unknown)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

From our scan and based on what the task is telling us we should clue in on this flatCore management system.

{715F1172-3692-4D28-A770-E80AEF4AC81E}.png

We can use searchsploit to look for flatcore vulnerabilities below

searchsploit flatcore
--------------------------------------------------------
Exploit Title                                                    |  Path
--------------------------------------------------------
FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated) | php/webapps/50262.py
FlatCore CMS 2.1.1 - Stored Cross-Site Scripting (XSS)           | php/webapps/51068.txt