3.2 KiB
TryHackMe-Cyborg
NMAP
Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-28 16:55 PKT
Nmap scan report for 10.10.203.159
Host is up (0.42s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 db:b2:70:f3:07:ac:32:00:3f:81:b8:d0:3a:89:f3:65 (RSA)
| 256 68:e6:85:2f:69:65:5b:e7:c6:31:2c:8e:41:67:d7:ba (ECDSA)
|_ 256 56:2c:79:92:ca:23:c3:91:49:35:fa:dd:69:7c:ca:ab (ED25519)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 30.22 seconds
Task 1
Scan the machine, how many ports are open?
2
Task 2
What service is running on port 22?
SSH
Task 3
What service is running on port 80?
HTTP
PORT 80 (HTTP)
Running feroxbuster
music_archive:$apr1$BpZ.Q.1m$F0qqPwHSOG50URuOVQTTn.
Navigating to /admin
We can download this tar archive on click the archive
tab also visiting admin
tab we can see some conversation which tells about squid proxy which we have already discoverd
Extracting the tar contents
This is all conmpressed and encrypted using Borg
. Now in order to recover these encrypted files we need to have borg on our machine so let's download the binary from github
It's asking for a passphrase ,so the hash we saw earlier let's try to crack it with john
We got the music_archive
which was in the conversation so now let's mount it on a folder using the passphrase
It wasn't really a secret!
And this might be the creds for SSH
Here in this script getops
is intersting which will lead us to privilege escalation
In the while loop c:
is the argument for getops also there is a swtich case for c
which is the command so if we specify a bash command specify -c in the script it will get excecuted as root.
We can get root if we specify bash
after -c but we will run into a problem that we cannot see the output of the commands we are typing so to get a proper root shell we can SUID /bin/bash and can spawn a root shell with it