CTF-Writeups/VulnHub/Misdirection.md
2021-05-19 19:58:12 +05:00

5.3 KiB

Vulnhub-Misdirection

NMAP



PORT     STATE SERVICE REASON         VERSION                                                                                                       
22/tcp   open  ssh     syn-ack ttl 64 OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                                                  
| ssh-hostkey:   
|   2048 ec:bb:44:ee:f3:33:af:9f:a5:ce:b5:77:61:45:e4:36 (RSA)  
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkS5yl+Dpb7vsMGbzAHXBYrVSUNTh4kYGh8zajM3ZujG0XHLvgkW7xJ6F/meai9IrCB5gTq7+tTsn+fqNk0cAZugz4h+vwm5ekXe5szPPHNx
NUlKuNAQ0Rch9k7jT/2pWjtsE5iF6yFlh1UA2vBKqrTWVU5vrGWswdFRMWICKWiFXwl1Tv93STPsKHYoVbq74v2y1mVOLn+3JNMmRNCBFqh8Z2x+1DTep0YY8vIV325iRK5ROKCJAPeyX33uoxQ/
cYrdPIS+Whs9QX0C+W343Hf2Ypq93h3/g3NNm54LvZdE6X2vTUcUHGdvK2gU+dWQOiDhCpMDv3wiEAwGlf87P5                                                              
|   256 67:7b:cb:4e:95:1b:78:08:8d:2a:b1:47:04:8d:62:87 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBM+YEivOAqHPDlFWduSuOjAjuJtfC9v/KW2uYB85gxQuibGJQZhFPcxwPEUf7UvQ/a5fr/keKY
F2Kdld6gO44jY=
|   256 59:04:1d:25:11:6d:89:a3:6c:6d:e4:e3:d2:3c:da:7d (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFHxbfiqinvu3cV7JoKrOF3w64zk+0N0h+/2nu+Z20Mk                                                                  
80/tcp   open  http    syn-ack ttl 64 Rocket httpd 1.2.6 (Python 2.7.15rc1)
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS             
|_http-server-header: Rocket 1.2.6 Python/2.7.15rc1
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
3306/tcp open  mysql   syn-ack ttl 64 MySQL (unauthorized)
8080/tcp open  http    syn-ack ttl 64 Apache httpd 2.4.29 ((Ubuntu))
| http-methods: 
|_  Supported Methods: GET POST OPTIONS HEAD
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works

PORT 80 (HTTP)

We could try signing up on the site

But it fails

PORT HTTP (8080)

Moving to port 8080 we can only see a default apache web server page

After running dirsearch fuzzing for files and directories

I saw these intersting directories so let's visit them

/shell didn't have anything

This looks like a rabbit hole, but as I visit /debug there's powney web shell running

Which means we can get a reverse shell simply by putting a bash reverse shell here

I tried the bash reverse shell but didn't got any connectio so let's try python

python did the trick and we have a rerverse shell so let's upgrade it to a tty

Now running sudo -l we'll see that we can bash as the user brexit

So we'll do sudo -u brexit /bin/bash

Let's transfer linpeason the machine to enumerate further

Privilege Escalation (Method 1)

We can see that /etc/passwd is owned by user group so we can write on this file

We are root !!1

Privilege Escalation (Method 2)

We can see that we are in lxd group , so we can abuse this to get root user , so on your local machine clone the apline image builder repoistory

Then run the script to create an image

Now you need to host this and transfer it to target machine and im

Run lxd init

Then initiliaze the image

Now this we are in a container and we had mounted the host system in /mnt/root

We have the flag but not root on the host so we can either add our ssh keys in authorized_keys or we can make bash a SUID , so I am going go the easy and make bash a SUID binary

Now exit the container

Privilege Escalation (Method 3)

This isn't really necessary and it might not work as the machine doens't have gcc installed so I am explicilty installing gcc on this machine

Now that gcc is installed we can compile the linux overlays kernel exploit

https://github.com/briskets/CVE-2021-3493

Make a .c file and copy the contents of expoit in it , then use gcc to compile the source code , give executable permissions to the binary and after running you'll get root instantly