# HackMyVM-Twisted ## NMAP ``` Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-12 09:38 PKT Nmap scan report for 192.168.1.66 Host is up (0.00018s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 80/tcp open http nginx 1.14.2 |_http-server-header: nginx/1.14.2 |_http-title: Site doesn't have a title (text/html). 2222/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | ssh-hostkey: | 2048 67:63:a0:c9:8b:7a:f3:42:ac:49:ab:a6:a7:3f:fc:ee (RSA) | 256 8c:ce:87:47:f8:b8:1a:1a:78:e5:b7:ce:74:d7:f5:db (ECDSA) |_ 256 92:94:66:0b:92:d3:cf:7e:ff:e8:bf:3c:7b:41:b7:5a (ED25519) MAC Address: 08:00:27:72:46:36 (Oracle VirtualBox virtual NIC) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 7.92 seconds ``` ## PORT 80 On the web page we see two images and one hinting being different so this means there is some stegnography invloved I ran`stegcracker` on both the images and found two messages In `markus` directory we see a note which tells about bonita's ssh private key. Going to web directory we find a `gogo.wav` file so let's download it to our machine and analyze it ! I uploaded this file as it was a morse code so analyzed it through online morese code analyzer and it was a rabbithole So only option left for me was to run linpeas. I found that there was a capaiblity set on `tail` which is like a SUID.So id_rsa that we found for `bonita` we cannot read it but we can read it through tail command. Tail will print the last ten lines of a file so we need to specify to print last 30 or 40 lines so we can get the whole id_rsa key There is a SUID binary but when running it says WRONG CODE so let's transfer it to our machine and analyze the binary So using ghidra I saw that it is comparing variable with a hex value 0x16f8 Convert the hex value to decimal value