nmap revealed port
22,80,110,143
(port 80 revealed an osint hint, so i looked on google for it and found this clue: Here ) cracked the passes on crackstation and ran metasploit moduleauxiliary/scanner/pop3/pop3_login
seina:scoobydoo2
came back possitive, by looking threw the emails ,
the admin sent them default new ssh pass,S1ck3nBluff+secureshell
by taking all the users names he sent to, i've ran a bruteforce to see who it matches,baksteen:S1ck3nBluff+secureshell
came back possitive
Logged in, and uploaded linpeas to enumerate, the groups a file popped up, /opt/cube/cube.sh ,
turns out he run as root by other file called/etc/update-motd.d/00-header
as soon as someone logs into ssh.
took a python reverse shell by 'Pentest Monkeys' and added to the 'cube.sh' file (at the end) opened listener and re-logged in into the ssh and a root shell spawned.