CTF-Writeups/TryHackMe/Nax.md
2021-01-03 22:58:44 +05:00

4.5 KiB

TryHackMe-Nax

NMAP

Host is up (0.45s latency).          
Not shown: 995 closed ports          
PORT    STATE SERVICE  VERSION                                                                                                                      
22/tcp  open  ssh      OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)                                                                 
| ssh-hostkey:                                                                                                                                      
|   2048 62:1d:d9:88:01:77:0a:52:bb:59:f9:da:c1:a6:e3:cd (RSA)                                                                                      
|   256 af:67:7d:24:e5:95:f4:44:72:d1:0c:39:8d:cc:21:15 (ECDSA)                                                                                     
|_  256 20:28:15:ef:13:c8:9f:b8:a7:0f:50:e6:2f:3b:1e:57 (ED25519)     
25/tcp  open  smtp     Postfix smtpd                                      
|_smtp-commands: ubuntu.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, 
|_ssl-date: TLS randomness does not represent time                        
80/tcp  open  http     Apache httpd 2.4.18 ((Ubuntu))                     
|_http-server-header: Apache/2.4.18 (Ubuntu)                              
|_http-title: Site doesn't have a title (text/html).                      
389/tcp open  ldap     OpenLDAP 2.2.X - 2.3.X                             
443/tcp open  ssl/http Apache httpd 2.4.18 ((Ubuntu))                     
|_http-server-header: Apache/2.4.18 (Ubuntu)                              
|_http-title: 400 Bad Request                                             
| ssl-cert: Subject: commonName=192.168.85.153/organizationName=Nagios Enterprises/stateOrProvinceName=Minnesota/countryName=US
| Not valid before: 2020-03-24T00:14:58                                   
|_Not valid after:  2030-03-22T00:14:58                                   
|_ssl-date: TLS randomness does not represent time                        
| tls-alpn:                          
|_  http/1.1                         
Service Info: Host:  ubuntu.localdomain; OS: Linux; CPE: cpe:/o:linux:linux_kernel                                                                  

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .                                                      
Nmap done: 1 IP address (1 host up) scanned in 95.23 seconds                          

PORT 80

If we go to port 80 we'll see a figure with some ASCII characters and on the bottom we will see some periodic table elements

If we do some fuzzing we will only be able to find index.php which is a login page for nagios XI

I tried using default credentials like root : password , admin admin , admin : password none of them worked , I also tried changing the cookie value but this was the message I got when I tried to login with that

Tried searching the nagiosxi directory but no look because I can't access them without being logged in !

Going back to the webpage where we saw the elements we know that these elements have atomic numbers

Do this for all elements and get thier atomic numbers

Ag - 47 Hg - 80 Ta - 73 Sb - 51 Po - 84 Pd - 46 Hg - 80 Pt - 78 Lr - 103

Now I tried to merge those numbers in a string 47480735184468078103 put it in cyberchef and tried convert from decimal,hex,base64.32 and all but couldn't find anything but then I had a hunch that these numbers might lead to an ASCII conversion of letters

47 - / 80 - P 73 - I 51 - 3 84 - T 46 - . 80 - P 78 - N 103 - g

So now combining them /PI3T.PNg

Using an online piet interpreter we'll get an error

First convert it to .png and then upload it to online interpreter for piet

nagiosadmin: n3p3UQ&9BjLp4$7uhWdY

These are the credentials

Now for the CVE

So we have found the exploit which is authenticated RCE and it is a metasploit exploit