diff --git a/VulnHub/Misdirection.md b/VulnHub/Misdirection.md new file mode 100644 index 0000000..5defde8 --- /dev/null +++ b/VulnHub/Misdirection.md @@ -0,0 +1,164 @@ +# Vulnhub-Misdirection + +## NMAP + +```bash + + +PORT STATE SERVICE REASON VERSION +22/tcp open ssh syn-ack ttl 64 OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) +| ssh-hostkey: +| 2048 ec:bb:44:ee:f3:33:af:9f:a5:ce:b5:77:61:45:e4:36 (RSA) +| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkS5yl+Dpb7vsMGbzAHXBYrVSUNTh4kYGh8zajM3ZujG0XHLvgkW7xJ6F/meai9IrCB5gTq7+tTsn+fqNk0cAZugz4h+vwm5ekXe5szPPHNx +NUlKuNAQ0Rch9k7jT/2pWjtsE5iF6yFlh1UA2vBKqrTWVU5vrGWswdFRMWICKWiFXwl1Tv93STPsKHYoVbq74v2y1mVOLn+3JNMmRNCBFqh8Z2x+1DTep0YY8vIV325iRK5ROKCJAPeyX33uoxQ/ +cYrdPIS+Whs9QX0C+W343Hf2Ypq93h3/g3NNm54LvZdE6X2vTUcUHGdvK2gU+dWQOiDhCpMDv3wiEAwGlf87P5 +| 256 67:7b:cb:4e:95:1b:78:08:8d:2a:b1:47:04:8d:62:87 (ECDSA) +| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBM+YEivOAqHPDlFWduSuOjAjuJtfC9v/KW2uYB85gxQuibGJQZhFPcxwPEUf7UvQ/a5fr/keKY +F2Kdld6gO44jY= +| 256 59:04:1d:25:11:6d:89:a3:6c:6d:e4:e3:d2:3c:da:7d (ED25519) +|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFHxbfiqinvu3cV7JoKrOF3w64zk+0N0h+/2nu+Z20Mk +80/tcp open http syn-ack ttl 64 Rocket httpd 1.2.6 (Python 2.7.15rc1) +| http-methods: +|_ Supported Methods: GET HEAD POST OPTIONS +|_http-server-header: Rocket 1.2.6 Python/2.7.15rc1 +|_http-title: Site doesn't have a title (text/html; charset=utf-8). +3306/tcp open mysql syn-ack ttl 64 MySQL (unauthorized) +8080/tcp open http syn-ack ttl 64 Apache httpd 2.4.29 ((Ubuntu)) +| http-methods: +|_ Supported Methods: GET POST OPTIONS HEAD +|_http-server-header: Apache/2.4.29 (Ubuntu) +|_http-title: Apache2 Ubuntu Default Page: It works + +``` + +## PORT 80 (HTTP) + + + +We could try signing up on the site + + + +But it fails + + + + +## PORT HTTP (8080) + +Moving to port 8080 we can only see a default apache web server page + + + +After running `dirsearch` fuzzing for files and directories + + + +I saw these intersting directories so let's visit them + + + +`/shell` didn't have anything + + + +This looks like a rabbit hole, but as I visit `/debug` there's powney web shell running + + + +Which means we can get a reverse shell simply by putting a bash reverse shell here + + + +I tried the bash reverse shell but didn't got any connectio so let's try python + + + +python did the trick and we have a rerverse shell so let's upgrade it to a tty + + + +Now running `sudo -l` we'll see that we can `bash` as the user `brexit` + + + +So we'll do `sudo -u brexit /bin/bash` + + + +Let's transfer `linpeas`on the machine to enumerate further + + + +## Privilege Escalation (Method 1) + +We can see that `/etc/passwd` is owned by user group so we can write on this file + + + + + + + +We are root !!1 + + +## Privilege Escalation (Method 2) + + + +We can see that we are in `lxd` group , so we can abuse this to get root user , so on your local machine clone the apline image builder repoistory + + + +Then run the script to create an image + + + + + +Now you need to host this and transfer it to target machine and im + + + + + +Run `lxd init` + + + +Then initiliaze the image + + + +Now this we are in a container and we had mounted the host system in `/mnt/root` + + + + + +We have the flag but not root on the host so we can either add our ssh keys in `authorized_keys` or we can make bash a SUID , so I am going go the easy and make bash a SUID binary + + + +Now exit the container + + + + + +## Privilege Escalation (Method 3) + +This isn't really necessary and it might not work as the machine doens't have `gcc` installed so I am explicilty installing gcc on this machine + + + + + +Now that gcc is installed we can compile the linux overlays kernel exploit + +https://github.com/briskets/CVE-2021-3493 + +Make a `.c` file and copy the contents of expoit in it , then use gcc to compile the source code , give executable permissions to the binary and after running you'll get root instantly + + \ No newline at end of file