# HackTheBox - Backdoor ## NMAP ```bash nmap -p- -sC -sV 10.10.11.125 --min-rate 5000 -v PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) |_http-generator: WordPress 5.8.1 | http-methods: |_ Supported Methods: HEAD 1337/tcp open waste? syn-ack ttl 63 Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel ``` ## PORT 80 (HTTP) From the scan we saw that there's a web server apache server running on port 80 At the bottom , we can see that this is a wordpresss site We can try to login with default creds like admin:admin It gives an error that password for `admin` user invalid but it didn't say that username is invalid so we could try to brute force but let's just leave it for the last. I tired to run an nmap scan for wordpress plugins but there wasn't any thing interesting ` nmap -p 80 --script http-wordpress-enum --script-args search-limit=2000 10.10.11.125 -vvv` I ran `wpscan` and used aggresive plugins scan but it was taking so long for it to complete instead I manully tried to enumerate plugins by going to `/wp-content/plugins` The readme file shows that it's using version 1.1 And this version is vulnerable to LFi `10.10.11.125/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl=../../../wp-config.php` This will download `wp-config.php` file which has the database credentials We can also download `/etc/passwd` file `http://10.10.11.125/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl=../../../../../../etc/passwd` But we can't do things like log posining as we are only able to download the file not view them directly , remember from our nmap scan we saw that there was a port 1337 but on connecting on the port we don't get any response ## Foothold In order to find what's running on that port we need can find it by reading ` /proc/sched_debug` , which shows all the processes that are running on the system On reading that file we can see that `gdbserver` is running and there's a remote code execution exploit available on metasploit I got another reverse shell as I wanted to stabilize the shell and the meterpreter shell isn't stable when we spawn bash So this enabled us to stabilize our shell , now to escalate our privleges I checked `sudo -l` to see if I can run something as root , tried the password that we found from wordpress config file but it didn't work Checked contab but there wasn't any cronjobs running, logging in to database we can see that there's an admin user's password for wordpress ## Privilege Escalation I checked the running processes and found that a command was being ran to create a deattached `screen` session We can create a deattach session using `-dmS session_name` and we can reattach the session with `-r session_name` but this wasn't working , since screen has SUID bit We can actually access the screen session as root through `screen -r root/` ## References - https://www.armourinfosec.com/wordpress-enumeration/ - https://stackoverflow.com/questions/9953973/how-to-collect-information-of-every-single-cpu - https://serverfault.com/questions/336594/share-screen-session-with-users-in-the-same-group-linux