mirror of
https://github.com/AbdullahRizwan101/CTF-Writeups
synced 2024-11-28 22:50:19 +00:00
Add files via upload
This commit is contained in:
parent
b585666744
commit
6e00a3a621
1 changed files with 202 additions and 0 deletions
202
TryHackMe/Tony_The_Tiger.md
Normal file
202
TryHackMe/Tony_The_Tiger.md
Normal file
|
@ -0,0 +1,202 @@
|
||||||
|
# TryHackMe-Tony The Tiger
|
||||||
|
|
||||||
|
## NMAP
|
||||||
|
|
||||||
|
```
|
||||||
|
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-14 20:08 PKT
|
||||||
|
Nmap scan report for 10.10.127.87
|
||||||
|
Host is up (0.15s latency).
|
||||||
|
Not shown: 989 closed ports
|
||||||
|
PORT STATE SERVICE VERSION
|
||||||
|
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)
|
||||||
|
| ssh-hostkey:
|
||||||
|
| 1024 d6:97:8c:b9:74:d0:f3:9e:fe:f3:a5:ea:f8:a9:b5:7a (DSA)
|
||||||
|
| 2048 33:a4:7b:91:38:58:50:30:89:2d:e4:57:bb:07:bb:2f (RSA)
|
||||||
|
| 256 21:01:8b:37:f5:1e:2b:c5:57:f1:b0:42:b7:32:ab:ea (ECDSA)
|
||||||
|
|_ 256 f6:36:07:3c:3b:3d:71:30:c4:cd:2a:13:00:b5:25:ae (ED25519)
|
||||||
|
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
|
||||||
|
|_http-generator: Hugo 0.66.0
|
||||||
|
|_http-server-header: Apache/2.4.7 (Ubuntu)
|
||||||
|
|_http-title: Tony's Blog
|
||||||
|
1090/tcp open java-rmi Java RMI
|
||||||
|
|_rmi-dumpregistry: ERROR: Script execution failed (use -d to debug)
|
||||||
|
1091/tcp open java-rmi Java RMI
|
||||||
|
1098/tcp open java-rmi Java RMI
|
||||||
|
1099/tcp open java-object Java Object Serialization
|
||||||
|
| fingerprint-strings:
|
||||||
|
| NULL:
|
||||||
|
| java.rmi.MarshalledObject|
|
||||||
|
| hash[
|
||||||
|
| locBytest
|
||||||
|
| objBytesq
|
||||||
|
| xpCCB
|
||||||
|
| xpCCB
|
||||||
|
| #http://thm-java-deserial.home:8083/q
|
||||||
|
| org.jnp.server.NamingServer_Stub
|
||||||
|
| java.rmi.server.RemoteStub
|
||||||
|
| java.rmi.server.RemoteObject
|
||||||
|
| xpwA
|
||||||
|
| UnicastRef2
|
||||||
|
|_ thm-java-deserial.home
|
||||||
|
4446/tcp open java-object Java Object Serialization
|
||||||
|
5500/tcp open hotline?
|
||||||
|
| fingerprint-strings:
|
||||||
|
| DNSStatusRequestTCP:
|
||||||
|
| GSSAPI
|
||||||
|
| NTLM
|
||||||
|
| CRAM-MD5
|
||||||
|
| DIGEST-MD5
|
||||||
|
| thm-java-deserial
|
||||||
|
| DNSVersionBindReqTCP, GenericLines, NULL:
|
||||||
|
| CRAM-MD5
|
||||||
|
| GSSAPI
|
||||||
|
| NTLM
|
||||||
|
| DIGEST-MD5
|
||||||
|
| thm-java-deserial
|
||||||
|
| GetRequest:
|
||||||
|
| DIGEST-MD5
|
||||||
|
| CRAM-MD5
|
||||||
|
| GSSAPI
|
||||||
|
| NTLM
|
||||||
|
| thm-java-deserial
|
||||||
|
| HTTPOptions:
|
||||||
|
| DIGEST-MD5
|
||||||
|
| GSSAPI
|
||||||
|
| CRAM-MD5
|
||||||
|
| NTLM
|
||||||
|
| thm-java-deserial
|
||||||
|
| Help:
|
||||||
|
| NTLM
|
||||||
|
| GSSAPI
|
||||||
|
| DIGEST-MD5
|
||||||
|
| CRAM-MD5
|
||||||
|
| thm-java-deserial
|
||||||
|
| Kerberos:
|
||||||
|
| CRAM-MD5
|
||||||
|
| DIGEST-MD5
|
||||||
|
| GSSAPI
|
||||||
|
| NTLM
|
||||||
|
| thm-java-deserial
|
||||||
|
| RPCCheck:
|
||||||
|
| NTLM
|
||||||
|
| DIGEST-MD5
|
||||||
|
| CRAM-MD5
|
||||||
|
| GSSAPI
|
||||||
|
| thm-java-deserial
|
||||||
|
| RTSPRequest:
|
||||||
|
| GSSAPI
|
||||||
|
| NTLM
|
||||||
|
| DIGEST-MD5
|
||||||
|
| CRAM-MD5
|
||||||
|
| thm-java-deserial
|
||||||
|
| SSLSessionReq:
|
||||||
|
| GSSAPI
|
||||||
|
| DIGEST-MD5
|
||||||
|
| NTLM
|
||||||
|
| CRAM-MD5
|
||||||
|
| thm-java-deserial
|
||||||
|
| TLSSessionReq:
|
||||||
|
| GSSAPI
|
||||||
|
| DIGEST-MD5
|
||||||
|
| NTLM
|
||||||
|
| thm-java-deserial
|
||||||
|
| TerminalServerCookie:
|
||||||
|
| DIGEST-MD5
|
||||||
|
| CRAM-MD5
|
||||||
|
| NTLM
|
||||||
|
| GSSAPI
|
||||||
|
|_ thm-java-deserial
|
||||||
|
8009/tcp open ajp13 Apache Jserv (Protocol v1.3)
|
||||||
|
| ajp-methods:
|
||||||
|
| Supported methods: GET HEAD POST PUT DELETE TRACE OPTIONS
|
||||||
|
| Potentially risky methods: PUT DELETE TRACE
|
||||||
|
|_ See https://nmap.org/nsedoc/scripts/ajp-methods.html
|
||||||
|
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1
|
||||||
|
| http-methods:
|
||||||
|
|_ Potentially risky methods: PUT DELETE TRACE
|
||||||
|
|_http-open-proxy: Proxy might be redirecting requests
|
||||||
|
|_http-server-header: Apache-Coyote/1.1
|
||||||
|
|_http-title: Welcome to JBoss AS
|
||||||
|
8083/tcp open http JBoss service httpd
|
||||||
|
|_http-title: Site doesn't have a title (text/html).
|
||||||
|
```
|
||||||
|
## PORT 80
|
||||||
|
|
||||||
|
<img src="https://imgur.com/TV4u49m.png"/>
|
||||||
|
|
||||||
|
We see an image so let's see if there is any stegongraphy involved in this
|
||||||
|
|
||||||
|
<img src="https://imgur.com/r7q42WH.png"/>
|
||||||
|
|
||||||
|
I tried to run `steghide` to extract something from the image but failed as there is something wrong with the bytes in the image
|
||||||
|
|
||||||
|
<img src="https://imgur.com/NeZlGLN.png"/>
|
||||||
|
|
||||||
|
Run `strings` on the image
|
||||||
|
|
||||||
|
<img src="https://imgur.com/7IUwqil.png"/>
|
||||||
|
|
||||||
|
|
||||||
|
Now download `jboss.zip` which is provided in the room
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## PORT 8080
|
||||||
|
|
||||||
|
<img src="https://imgur.com/8HOa5VJ.png"/>
|
||||||
|
|
||||||
|
There is an `administrative console` and try to login with default credentials which are `admin`:`admin`
|
||||||
|
|
||||||
|
<img src="https://imgur.com/0JLEwU4.png"/>
|
||||||
|
|
||||||
|
<img src="https://imgur.com/ZAXM7JP.png"/>
|
||||||
|
|
||||||
|
|
||||||
|
<img src="https://imgur.com/hWrXG53.png"/>
|
||||||
|
|
||||||
|
|
||||||
|
Now search for the `jboss` exploit and on the github page you'll find it
|
||||||
|
|
||||||
|
<img src="https://imgur.com/eVgsIfx.png"/>
|
||||||
|
|
||||||
|
Run it like it does in the picture
|
||||||
|
|
||||||
|
<img src="https://imgur.com/8rS5aAp.png"/>
|
||||||
|
|
||||||
|
<img src="https://imgur.com/0MpKvKB.png"/>
|
||||||
|
|
||||||
|
Looking in `jboss` directory we'll find a password
|
||||||
|
|
||||||
|
<img src="https://imgur.com/a5ydOew.png"/>
|
||||||
|
|
||||||
|
## Privilege Escalation
|
||||||
|
|
||||||
|
<img src="https://imgur.com/2ADqgUL.png"/>
|
||||||
|
|
||||||
|
We can see that we can run `find` as `sudo` so we can run find to execute a command to add `jboss` in sudoers
|
||||||
|
|
||||||
|
`jboss@thm-java-deserial:~$ sudo /usr/bin/find . -exec usermod -aG jboss \;`
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
jboss@thm-java-deserial:~$ sudo -l
|
||||||
|
Matching Defaults entries for jboss on thm-java-deserial:
|
||||||
|
env_reset, mail_badpass,
|
||||||
|
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
|
||||||
|
|
||||||
|
User jboss may run the following commands on thm-java-deserial:
|
||||||
|
(ALL) NOPASSWD: /usr/bin/find
|
||||||
|
(ALL : ALL) ALL
|
||||||
|
jboss@thm-java-deserial:~$ sudo bash
|
||||||
|
[sudo] password for jboss:
|
||||||
|
root@thm-java-deserial:~#
|
||||||
|
```
|
||||||
|
To get the root flag , it is in `base64` encoded
|
||||||
|
|
||||||
|
<img src="https://imgur.com/VRkOsqs.png"/>
|
||||||
|
|
||||||
|
Now let's use `hashcat` it is in `md5 raw` so we can crack it
|
||||||
|
<img src="https://imgur.com/sCt8jzN.png"/>
|
||||||
|
|
||||||
|
<img src="https://imgur.com/78s7kFU.png"/>
|
||||||
|
|
Loading…
Reference in a new issue