Page 1
Sense
Enumeration , Open-source exploit
Directory enumeration leads to credentials , through which able to login to website
Open exploit leads to command-injection , giving direct access to root
Solidstate
Initial β rsip , pop3 || Privesc β pspy32 , script-modification
Exploiting
rsip(4555) with default credentials leads to user enumeration and password change.Using those username with changed password on
pop3(110) leaks SSH creds in usermindymail.Getting shell as
mindy& runningpspy32gives a script/opt/tmp.pyrunning as rootModifing the script and putting reverse shell in it gives us the shell as root.
Haircut
RFI (curl) β PHP shell β RCE || Privesc β Find command , Screen-4.5.0 , pwnkit
On website , able to perform RFI on Local/Remote Host (as curl running in background).
Used RFI to upload php webshell , which can be triggered from site/uploads.
Got shell as
www-data, for privesc used pwnkit leads torootAlternate privesc β screen-4.5.0
Keeper
Default Creds || Privesc β Keepass (CVE-2023-32784) | Putty-Key β openssh convert
On website
request ticketeris running ofBest practicalwith login form.Default creds gives access , inside that under /user directory i am able to find password for user
LisaAfter SSH , inside home directory able to find file.zip , which on extract gives
Keepassdump &kdbx file.For dumping password/key i used https://github.com/vdohney/keepass-password-dumper exploit , later use the master-key on file.kdbx using
kpcliThe above part done with dotnet version 7.0Enumeration gives
PUTTY-keyfor user root , Convert Puttykey to ssh and got the shell as root
Ready
Initial β SSRF -> redis RCE (open-exploit) || Privesc β Backup file in /opt
On port 5080 website is running the gitlab , enumeration gives us the outdated version
(11.4.7)Open Exploit available , for explanation of the vulnerability refer
For privesc, found password :
wW59U!ZKMbG9+*#hingitlab.rbfile located in/opt/backup
Popcorn
Initial β PHPinfo , File-Upload || Privesc β Kernel Exploit , Full-Nelson.c DIrty-Cow
Website and SSH is open , directory enum gives 2 interesting dirs :- /test & /torrent
/test β Shows phpinfo page ( file upload is enabled)
/torrent β Login & Sign-Up page is running
After creating user and sign-in i got a upload form , which accepts only torrent file nothing else. (php webshell not allowed)
After uploading .torrent file , we get another upload functionality for screenshot
uploading php-webshell gives success & response disclose upload path
/torrent/upload/Navigating to path , we see our webshell , triggring it gives reverse shell
uname -a / uname -r, gives the vulnerable linux version 2.6.37, upload and execute any exploit gives us root.Full-Nelson.c β https://www.exploit-db.com/exploits/15704
DirtyCow
Passage
Monitored
Delievery
\
Node
Viewing website (3000) gives some usernames and checking
app.jsusing Dev-Tools leaks the usernames & hashes.Using these creds on the same website leads to get authenticate as user
admin accountfrom where i can download the backup file.Decoding file.backup with base64 β file.zip , unzipping it gives hash β cracking the hash gives β SSH creds for user
markps -auxxgives 2 file running as usertom
Admirer
Nmap gives 21,22,80 port open with disallow entry :
admin-dirin robots.txtRecon on http://$ip/admin-dir gives 2 .txt files
contacts.txt β Holds email-address & username (NO USE)
credentials.txt β Holds FTP username & password
Loggin-in & enumerating it gives us files :
dump.sql β (Nothing interesting except Database Name : admirerdb )
html.tar.gz β extracting it gives some directories and files , intereseting one :
/utility-scripts
/utility-scripts/dbadmin.php (Holds username
waldo, password & database)
Emumerating
http://$ip/utility-scriptsgivesadminer.php, which has mysql connect running on it , {tried the creds i found , but didn't work}Using
serverfield , we can also connect to remote server , i set up the mysql on my attacking machine and set user/pass , logging in to it , gives accessAfter getting inside , i loaded the local file and viewing it gives me another creds for
waldo whichwork for SSHInside SSH session , doing sudo -l gives a file : /opt/scripts/admin_task.sh for which SETENV is available , reading it gives on
function 6it runs a script/opt/scripts/backup.pybackup.py is importing make_archive from shutil library
Creating a
shutil.pyfile/library inside /tmp directory and injecting reverse shell in it.
Exploiting using sudo right on path-variable (SETENV) and also on
/opt/scripts/admin_task.sh
Last updated