<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Drupal on Melisa Saritas</title><link>https://melisasaritas.github.io/tags/drupal/</link><description>Recent content in Drupal on Melisa Saritas</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 05 May 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://melisasaritas.github.io/tags/drupal/index.xml" rel="self" type="application/rss+xml"/><item><title>DC-1 – VulnHub</title><link>https://melisasaritas.github.io/p/dc-1/</link><pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><guid>https://melisasaritas.github.io/p/dc-1/</guid><description>&lt;img src="https://melisasaritas.github.io/p/dc-1/cover.jpg" alt="Featured image of post DC-1 – VulnHub" />&lt;p>DC-1 – VulnHub&lt;/p>
&lt;p>DC-1 is a beginner-friendly vulnerable machine hosted on VulnHub, featuring a web application running on an outdated version of Drupal, a popular content management system. The goal is to exploit the CMS and ultimately gain root access by progressing through multiple phases of attack.&lt;/p>
&lt;p>The process begins with scanning the network to identify open services such as SSH, HTTP, and RPC. Once the target is mapped, exploitation is carried out using a known vulnerability—CVE-2018-7600, also known as Drupalgeddon2—through the Metasploit framework. Upon successful exploitation, a reverse shell is established and upgraded for better interactivity. The final stage involves privilege escalation by leveraging a misconfigured SUID binary to obtain root-level access.&lt;/p>
&lt;p>Each phase is executed using tools like netdiscover, nmap, Metasploit, and native Linux commands, providing a realistic and hands-on experience with common offensive security techniques such as network enumeration, exploitation, and post-exploitation.&lt;/p>
&lt;p>For a detailed step-by-step walkthrough of the solution, refer to the attached PDF file:&lt;/p>
&lt;p>📄 &lt;a class="link" href="https://melisasaritas.github.io/writeups/files/DC1_WriteUp.pdf" >Solution: DC-1.pdf&lt;/a>&lt;/p>
&lt;blockquote>
&lt;p>Photo by &lt;a class="link" href="https://unsplash.com/@fantasyflip?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash" target="_blank" rel="noopener"
>Philipp Katzenberger&lt;/a> on &lt;a class="link" href="https://unsplash.com/photos/closeup-photo-of-turned-on-blue-and-white-laptop-computer-iIJrUoeRoCQ?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash" target="_blank" rel="noopener"
>Unsplash&lt;/a>&lt;/p>&lt;/blockquote></description></item></channel></rss>