6.6 KiB
Vulnhub-Literally Vulnerable
Rustscan
PORT STATE SERVICE REASON VERSION
21/tcp open ftp syn-ack ttl 64 vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r-- 1 ftp ftp 325 Dec 04 2019 backupPasswords
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:192.168.1.8
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 1
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp open ssh syn-ack ttl 64 OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 2f:26:5b:e6:ae:9a:c0:26:76:26:24:00:a7:37:e6:c1 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCjIkOglOWYfz+TBASrrFUwDGUNBzPhMd6PLVbELdtIRKWEy2IHM2JrlncDFPEh1YTE79HaRbhJLnEI2z+fVLH1hDKafEjvhGdo62uenhZlI5
GUk/b60hqv0yybZftezvRLXQ5Aa9fPxHerRZOktHoRzkS5WeeZmp5Bprm//q5Di8BBnFQERH28hIUTqHBHmSOLMfRPP8OSrC3txB6gk3w2asp7YLio/tb+BljUlxpDUAGZ3laHKEBhkm5936ShDh
OidZ+oduKxy2j3gji9Pk/yDXdt0109knCYW2Wz3Nh6sZBbvhSR6mSeYRmRcgtmSw3GLdA6WPaNqytn51w6uwEd
| 256 79:c0:12:33:d6:6d:9a:bd:1f:11:aa:1c:39:1e:b8:95 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBAnd9KWbuz1oyVBcGqABiFwm+tO2EGRsE5KzvvzYuzjYk/U2tgOx1joZAX/jeii3oK2oW/Kmtu
DA07GPEplj9sY=
| 256 83:27:d3:79:d0:8b:6a:2a:23:57:5b:3c:d7:b4:e5:60 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMhQsU6o12hyENGgq/DI3I4sWHsJpLCuxITMtMaiwh/A
80/tcp open http syn-ack ttl 64 nginx 1.14.0 (Ubuntu)
|_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
|_http-generator: WordPress 5.3
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: nginx/1.14.0 (Ubuntu)
|_http-title: Not so Vulnerable – Just another WordPress site
|_http-trane-info: Problem with XML parsing of /evox/about
65535/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
MAC Address: 80:00:0B:3C:4A:7E (Intel Corporate)
PORT 21 (FTP)
We get a file having passwords
PORT 80 (HTTP)
We have a wordpress site but css isn't loaded properly because it's using literally.vulnerable
So let's add it to our /etc/hosts file
Running wpscan against the wordpress site we only find 1 user (admin)
Tried brute forcing against user admin
So I ran wpscan again for enumerating plugins
Let's just keep it running in the background and enumerate another http port
PORT 65535 (HTTP)
Ran dirbuster on that port but nothing seemed interesting
Used the wordlist from seclists
And found /phpcms
We find a post regarding a note for john
Ran wpscan on this wordpress site and found two usernames
And we found a valid password for maybeadmin
by using the passwords we found from ftp
We got into the dashboard but we are not admin
So we cannot do anything but there was a password protected post maybe we can see what's in there
Let's login as notadmin
Edit the 404.php
page of the theme with a php reverse shell
But it seems we can't do it manually so my next option is to use metasploit wordpress upload shell exploit
I used a php reverse shell so that I can get a stabilized one
We see some files in doe
's directory
On running the binary itseasy
it was printing the current path
So this means we must export PWD
and tamper with it
So here I edit the environmental variable PWD
with a command which will run the whoami command and save it's output in /tmp/output
So it means we can run commands as john
through this binary so I created a .ssh folder in john's directory now I can add id_rsa.pub in authorized_keys file
We get the user flag plus a note
On running find command for finding files owned by john
Now we can run test.html
file as root but there it isn't on the machine and we cannot make that file as john does not have the permissions but www-data
so going back to that user