Proving Ground - Linux
Extplorer
Initial ⇒ Open-source , Default Creds , File upload Privesc level 1 ⇒ Enumeration , Creds Privesc level 2 ⇒ Disk partition exploitation
Nmap gives 22,80 & dir enum gives
/filename, on whichextplorerapplication is running with the login-site , for which default creds work and we get insideAlso can upload PHP shell and get a rev shell as user
www-data, Inside i found hash for userdorain/var/www/html/filename/config > .htusers.phpInside shell-as-dora , doing
idgives disk-partition which we can exploit usingdebugfsto get root
KeyVault
Initial ⇒ File upload , rsync , Command Injection Privesc ⇒ Reverse Engenring , ---
nmap gives 22 , 80 , 874
Website is file scanner application which gives upload functionality and then gives virus scan output , after a lot of attempts of uploading file , the final thing is to upload the file with
php3extensionWhen navigating to the file , the application just render it instead of giving rev-shell
Using
rsyncgives source fileupload.php, which tells the filename is directly passing thorough the set of bash commands (basically running virus scan on it)The file-upload functionality was a [RABBIT-HOLE] , we can perform command injection in filename parameter
After inserting rev-shell in filename we got the shell
For Privesc , there is binary /opt/apache-restart , which on execution directly inputs the root password.
Flimsy
Surf
Initial ⇒ Login Bypass , Open-source Exploit (RCE) , SSRF Privesc Level 1 ⇒ Database Creds , Privesc Level 2 ⇒ sudo -l , overwrite script/file.php
On 80 , website is running the login page which can be bypass by decoding base64 and changing the value from
{success = false} ⇒ {success = true}Inside application on page
checkserver.php, is running server which is vulnerable to SSRF , but no use but the software isphpfusion, which has open exploit RCEAfter getting shell as
www-datawe can get database creds which work for user james as well , file :-/var/www/server/administration/config/config.phpDoing
sudo -lgives we can php on file/var/backups/database-backup.phpAs user www-data , we can overwrite it and insert rev-shell , execute it as james ⇒ root.
Last updated