🟑solidstate

RSIP | POP3 | LEAK CREDENTIALS | rbash PRIV-ESC | COMMAND INJECTION IN PYTHON SCRIPT |

Recon & Enum

port scan

22/tcp   open  ssh
25/tcp   open  smtp
80/tcp   open  http
110/tcp  open  pop3
119/tcp  open  nntp
4555/tcp open  rsip

directory scan

/.html                (Status: 403) [Size: 291]
/images               (Status: 301) [Size: 311] [--> http://10.10.10.51/images/]
/index.html           (Status: 200) [Size: 7776]
/services.html        (Status: 200) [Size: 8404]
/about.html           (Status: 200) [Size: 7183]
/assets               (Status: 301) [Size: 311] [--> http://10.10.10.51/assets/]
/README.txt           (Status: 200) [Size: 963]
/LICENSE.txt          (Status: 200) [Size: 17128]
/.html                (Status: 403) [Size: 291]
/server-status        (Status: 403) [Size: 299]

website

Nothing much over here

rsip

i tried root login with default credentials , and i got access

then i listed all the users and after that , i changed password for every user with pass "kali"

pop3

After that , i jumped to pop3 to watch if their is any mail exists for any of the users , as i have the password now , i used telnet to connect , and i checked for every user

and in mindy user mail , i got something juicy

shell as mindy

i got shell as mindy , but its a restricted shell (rbash) , i tried alot things , but none of them work for me

at last i exited , and try ssh with force bash tty , and i got the shell

privesc mindy => root

i noticed that , my transferd scripts (linpeas, etc...) in /tmp/ directory are deleted after a while, so i tried pspy pspy64 didn't worked , lets check cpu architecture (bits)

system is 32 bit

pspy32

i found a script which is set in cronjob and root executable this is the filewhich is deleting my stuff and it is also a writable python script , lets inject our rev shell in it

and i got a call back on my listner... got the shell as root

Last updated