NETWORK
SCANS
ENUMERATION
Looking into the /blog
Let check the source code of this page
curl http://192.168.74.230/blogs/ --silent | grep '<!--' | sed -e 's/^[[:space:]]*//'
Let continue with the new clue we have
curl http://192.168.74.230/S3cr3t-T3xt/ --silent | grep '<!' | sed -e 's/^[[:space:]]*//'
We have found 3xtr4ctd4t4
FTP enumeration
Looking into the FTP, we have found a jpg file
Steganography
This file seems to carry some hidden information into it
Using the password we have discover on the previous step 3xtr4ctd4t4
we are able to reveal the hidden data
We can extract the information with the following command
steghide --extract -sf 'trytofind.jpg' -p 3xtr4ctd4t4
We have a potential user ‘renu’ looking into the hidden file
FOOTHOLD
SSH as Renu
Running hydra against the SSH we managed to found Renu SSH password
renu / 987654321
PRIV ESCALATION
Looking into the .bash_history file we can see the following information
Using the ssh key found in Renu account
we have access to lily account
Looking into the sudo permissions of lily user, we can see
Looking into gtfobin, we can see that we can exploit this command with the following
Running this command, we get a root session