5.3 KiB
Vulnhub-Misdirection
NMAP
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 64 OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 ec:bb:44:ee:f3:33:af:9f:a5:ce:b5:77:61:45:e4:36 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCkS5yl+Dpb7vsMGbzAHXBYrVSUNTh4kYGh8zajM3ZujG0XHLvgkW7xJ6F/meai9IrCB5gTq7+tTsn+fqNk0cAZugz4h+vwm5ekXe5szPPHNx
NUlKuNAQ0Rch9k7jT/2pWjtsE5iF6yFlh1UA2vBKqrTWVU5vrGWswdFRMWICKWiFXwl1Tv93STPsKHYoVbq74v2y1mVOLn+3JNMmRNCBFqh8Z2x+1DTep0YY8vIV325iRK5ROKCJAPeyX33uoxQ/
cYrdPIS+Whs9QX0C+W343Hf2Ypq93h3/g3NNm54LvZdE6X2vTUcUHGdvK2gU+dWQOiDhCpMDv3wiEAwGlf87P5
| 256 67:7b:cb:4e:95:1b:78:08:8d:2a:b1:47:04:8d:62:87 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBM+YEivOAqHPDlFWduSuOjAjuJtfC9v/KW2uYB85gxQuibGJQZhFPcxwPEUf7UvQ/a5fr/keKY
F2Kdld6gO44jY=
| 256 59:04:1d:25:11:6d:89:a3:6c:6d:e4:e3:d2:3c:da:7d (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFHxbfiqinvu3cV7JoKrOF3w64zk+0N0h+/2nu+Z20Mk
80/tcp open http syn-ack ttl 64 Rocket httpd 1.2.6 (Python 2.7.15rc1)
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Rocket 1.2.6 Python/2.7.15rc1
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
3306/tcp open mysql syn-ack ttl 64 MySQL (unauthorized)
8080/tcp open http syn-ack ttl 64 Apache httpd 2.4.29 ((Ubuntu))
| http-methods:
|_ Supported Methods: GET POST OPTIONS HEAD
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
PORT 80 (HTTP)
We could try signing up on the site
But it fails
PORT HTTP (8080)
Moving to port 8080 we can only see a default apache web server page
After running dirsearch
fuzzing for files and directories
I saw these intersting directories so let's visit them
/shell
didn't have anything
This looks like a rabbit hole, but as I visit /debug
there's powney web shell running
Which means we can get a reverse shell simply by putting a bash reverse shell here
I tried the bash reverse shell but didn't got any connectio so let's try python
python did the trick and we have a rerverse shell so let's upgrade it to a tty
Now running sudo -l
we'll see that we can bash
as the user brexit
So we'll do sudo -u brexit /bin/bash
Let's transfer linpeas
on the machine to enumerate further
Privilege Escalation (Method 1)
We can see that /etc/passwd
is owned by user group so we can write on this file
We are root !!1
Privilege Escalation (Method 2)
We can see that we are in lxd
group , so we can abuse this to get root user , so on your local machine clone the apline image builder repoistory
Then run the script to create an image
Now you need to host this and transfer it to target machine and im
Run lxd init
Then initiliaze the image
Now this we are in a container and we had mounted the host system in /mnt/root
We have the flag but not root on the host so we can either add our ssh keys in authorized_keys
or we can make bash a SUID , so I am going go the easy and make bash a SUID binary
Now exit the container
Privilege Escalation (Method 3)
This isn't really necessary and it might not work as the machine doens't have gcc
installed so I am explicilty installing gcc on this machine
Now that gcc is installed we can compile the linux overlays kernel exploit
https://github.com/briskets/CVE-2021-3493
Make a .c
file and copy the contents of expoit in it , then use gcc to compile the source code , give executable permissions to the binary and after running you'll get root instantly