5.3 KiB
TryHackMe-GoldenEye
NMAP
Nmap scan report for 10.10.81.165
Host is up (0.15s latency).
Not shown: 65531 closed ports
PORT STATE SERVICE VERSION
25/tcp open smtp Postfix smtpd
|_smtp-commands: ubuntu, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: GoldenEye Primary Admin Server
55006/tcp open ssl/unknown
|_ssl-date: TLS randomness does not represent time
55007/tcp open pop3 Dovecot pop3d
|_pop3-capabilities: AUTH-RESP-CODE TOP CAPA PIPELINING USER UIDL RESP-CODES SASL(PLAIN) STLS
|_ssl-date: TLS randomness does not represent time
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 502.67 seconds
PORT 80
Looking at source code
This is an encoded text on visting cyberchef
and decoding it using magic
we decoded the text
InvincibleHack3
is the password for boris
But these creds are not right
So let's enumerate different ports
PORT 55007 (POP3)
I tired to brute force with boris
but failed
Earlier from the source code of the web page we saw a message that "Natalya could break your code" so maybe that's a potential username that we need to brute force so again using hydra
After some time I was able to get the correct password
Also got boris's password with the fasttrack
wordlist
Boris's Mail
Here we used telnet to connect to pop3 service and logged in with boris's credentials. We can see that there are 3 messages
Message 1
### Message 2 ### Message 3Natalya's mail
We do the same with natalya's mail
Message 1
Message 2
So we found the creds and a domain , lets add the domain in /etc/hosts
file
Navigate to severnaya-station.com/gnocertdir
and login with xenia's credentials
Going to user's messages we can find a conversation with a user doak
We find doak's password with the same procedure
Doak's Mail
Message
Login as dr_doak on the website
This is the message we get from that text file
007,
I was able to capture this apps adm1n cr3ds through clear txt.
Text throughout most web apps within the GoldenEye servers are scanned, so I cannot add the cr3dentials here.
Something juicy is located here: /dir007key/for-007.jpg
Also as you may know, the RCP-90 is vastly superior to any other weapon and License to Kill is the only way to play.
Running exiftool
on it we can find a base64 encoded text
Now we are logged in as admin. One thing we can do now is look for any exploits for Moodle
Getting a reverse shell
For some reason the exploit wasn't working . I double checked everything but still it was failing
So I went with the manual exploitation of moodle
Under settings go to plugins ->Text Editors -> TinyMCE HTML editor and make sure to select Spell Engine as PSpellShell
Then make a blog post entry and click on spell check icon , if you have setup your netcat listener you'll get a shell frorm the target machine
Looking for kernel version
This is a really old kernel for linux so hopeully there will be an exploit on exploit-db
Download ,compile and transfer it to target machine
But on running it gave an error because gcc was not installed on the machine
On googling I found cc which is alternate to gcc and it was on the box
So we had to edit the exploit by replacing gcc
to cc
and then again transfer the compiled source code to the box
We got root !!