NETWORK

ENUMERATION

port 80

Looking into the port 80 we can see that it is a protected page which requires an authentication

Port 8088

A directories brute force reveals the following

Unfortunately, none of these directories would offer a potential route to access this server

Port 7601

A directories brute force of this machine offers the following

FOOTHOLD

Finding private key

Looking into the folder /keys on port 7601, we have found a private key

Retrieving passwords

Looking into the folder /secret on port 7601, we have found a few password related files

The shadow file, only reveals one user “r@bbit-hole”

We then used John to crack this shadow password

We where not successful with trying this password on SMB and SSH (and the authentication form on port 80)

SSH Brute force

Using the file password.lst found in the previous step

We were able to find the access of a user seppuku

hydra -l seppuku -P password.lst 192.168.250.90 ssh

SSH as Seppuku

Using the password found in the previous step, we were able to access the server as user Seppuku

PRIV ESCALATION

Pivoting to Samurai

The enumeration of the machine revealed multiple users

and a file .passwd in Seppuku’s home directory revealed a password

Trying the password in the .passwd file against the different users on the server, we were able to pivot to user Samurai

Pivoting to Tanto

The sudo permissions for user Samurai revealed a potential route to owning this box but that required us to pivot to Tanto

Using the private key we found earlier we got access to Tanto account

Getting root

Because Samurai can run the following command with Sudo

We went on to create a bin binary to escalate our privileges to root. To do so, we have done the following

mkdir .cgi_bin/
touch .cgi_bin/bin
echo "/bin/sh -p" > .cgi_bin/bin
chmod +x .cgi_bin/bin

then with Samurai we were able to run the script and escalate our privileges