BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
HTB MonitorsTwo Walkthrough
/in General NewsNot a bad BOX, the foothold towards the user flag is interesting, but privileges escalation to root is a little less convincing. Let’s begin.
The nmap scan.
As usual, we start from a portal; I don’t see any indications of particular domain names, so we proceed in the more traditional way, browsing the portal by IP address.
Wow, really nice! :D
And some more information via the wappalyzer.
From the news box, the Cacti 1.2.24 was released on Feb 27, 2023!
Anyway, searching for some exploit about it…
The script doesn’t seem to work, failing. I tried to reproduce the injection manually, but I get an “unauthorized” message, even though the returned http code is 200.
Let’s go ahead. Another link seems to suggest that there is a module on the metasploit framework.
Nothing, but we have a lot of exploits to try. Next one!
Let’s try if the target is vulnerable!
And it seems yes.
Really good, let’s understand who am I!
What I expected!
We can then to the reverse shell… listener listening (that’s horrible)…
…and attack!
After a lot of reverse shells, I found the right one:
That I have to pass in base64!
You can generate your reverse shell in a simple way using this site:
And the shell is served!
It seems I don’t have permission to read the /home folder; let’s look for any clues left in the surroundings before running a session with linpeas. Let’s check the list of the users in the meantime.
What? There doesn’t seem to be any user who can log in! there is something strange about this BOX!
I found a SQL script that creates the database for the portal and looking inside…
Undecided between a simple hexadecimal algorithm or an MD5, it was enough for me to search for the string online to discover the very mysterious password of the admin user.
However, the password must have been changed, as I cannot access the portal. Another interesting file was the config.php in the include folder.
Try to connect to the MySQL server. Unfortunately, I can’t spawn a tty shell and the mysql command line seems to not answer in the best way, so I have to execute commands manually using the mysql command line execution argument.
Let’s list the tables.
And the contents of some interesting tables.
Well, the admin user changed his password and a new user appeared in the list… we have a couple of interesting passwords to try and crack.
Save the password into a file.
Let’s that hashcat tries to identify the algorithm of the hashing method.
Mmmm, not so lucky today. Let’s try with my friend john!
Definitely better.
Even though he’s a portal user, he seems to have trouble logging in, but it’s much better if you use him to log in over ssh!
Thus obtaining the user flag! At first glance, it seems like I can’t do much with this user, so let’s download linpeas and make it available from our native php web server.
Let’s get ready to receive the scan from the BOX.
And we initiate the attack on the remote machine without leaving any traces.
Let’s look at the most interesting points of scan linpeas.
This time I don’t seem to have found much of interest in the linpeas session, apart from an open port locally; we will investigate this shortly. Let’s try to take a look at the suggested CVEs, even if by now, most of the time they are false positives.
If I really can’t find anything else, I’ll come back to it.
It doesn’t seem to come back to me much. I can’t find any info on which process is using port 35077 with the conventional methods (netstal, lsof, ecc…). After double-checking the CVEs suggested by linpeas, but without getting any success, I started reading posts in the official HTB forum. Many users talk about SUID and docker (things I’ve already checked among other things but maybe not good enough at this point). So I focus on these two clues.
Files available with SUID permissions don’t help me and I can’t even launch docker commands due to lack of permissions. Searching for some exploits I find a lot of docker stuff.
The docker version available on the machine could help me identify a specific exploit.
I download the results for an easier search (fortunately it’s only two pages). I import the data into an excel file and perform a quick search based on the docker version in the BOX. Three results come out.
The CVE-2021-41092 (execution vulnerability), CVE-2021-21285 (unknown) and CVE-2021-21284 (Traversal path vulnerability).
The CVE-2021-41092 inspires me, it allows the execution of commands following a login to a personal docker registry, I look for some exploits, but I can’t find anything useful and even by approaching some personal experiments, I get nothing.
CVE-2021-21285 doesn’t really work for me, causing the docker daemon to crash when pulling an image (which I can’t do due to a lack of permissions, among other things). The CVE-2021-21284 remains for which I can’t find anything as interesting as the previous ones. After a while, I search online for some other exploits on the specific version (Docker 20.10.5 exploit) and among the first results there is an interesting git repository.
The exploit is not on the docker CLI, but on the docker engine itself (the Moby). Taking a look at the script and executing some commands from the BOX’s shell to understand if the vulnerability is actually present, I don’t get excellent results, but trying doesn’t cost anything anyway, so I download the script on my machine and then execute it, as always, without a trace!
Ready!
Woooo, what a fantastic surprise, even if from the preliminary tests it didn’t seem feasible to me. Anyway, another interesting BOX indeed. As always, while waiting for another machine, have good hacking. That’s all folks.
Secjuice – Read More
These alternatives to popular apps can help reclaim your online life from billionaires and surveillance
/in General NewsNot every app or service is trying to monetize your personal data. Here are some of our favorite alternatives to popular apps.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Why New York is a Prime Location for Leading Mobile Development Agencies
/in General NewsNew York, the city that never sleeps, is renowned as a global epicentre for innovation, creativity, and business…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Andrew Tate’s University Breach: 1 Million User Records and Chats Leaked
/in General NewsAndrew Tate’s “The Real World” platform has been breached, again, leaking user data including emails and private chat…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Russia’s Ballistic Missile Attack on Ukraine Is an Alarming First
/in General NewsThis is the first time Russia has used its so-called Oreshnik intermediate-range ballistic missile in combat. The launch also serves as a warning to the West.
Security Latest – Read More
The rise and fall of the ‘Scattered Spider’ hackers
/in General NewsThe prolific hacking group broke into Caesars Entertainment, Coinbase, DoorDash, Mailchimp, Riot Games, Twilio (twice), and dozens more.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Meet three incoming EU lawmakers in charge of key tech policy areas
/in General NewsThe European Union looks to have clinched political agreement on the team of 26 commissioners who will be implementing President Ursula von der Leyen’s policy plan for the next five years. A final vote is still pending next week, but on Thursday, Politico’s Brussels Playbook newsletter reported a deal in the European Parliament on the […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn
/in General NewsThe North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of cryptocurrency as part of social engineering campaigns orchestrated over a six-month period.
These findings come from Microsoft, which said that multiple threat activity clusters with ties to the country have been observed creating fake profiles on LinkedIn, posing as both
The Hacker News – Read More
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
/in General NewsGovernment agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077.
The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against the Defense Industrial Base (DIB), aviation, telecommunications, and financial and legal services across the world, Microsoft said.
The Hacker News – Read More
Andrew Tate’s ‘Educational Platform’ Was Hacked
/in General NewsPlus: The worst telecom hack in US history rolls on, iPhones are harder to break into, and more of the week’s top security news.
Security Latest – Read More