THM Kenobi - grunt92/IT-Sec-WriteUps GitHub Wiki

Deploy the vulnerable machine

Make sure you're connected to our network and deploy the machine

No answer needed

Scan the machine with nmap, how many ports are open?

Run nmap -A -p- IP. Ignore the ports with an ending like this:"(RPC #100****)" 7

Enumerating Samba for shares

Using the nmap command above, how many shares have been found?

3

Once you're connected, list the files on the share. What is the file can you see?

log.txt

What port is FTP running on?

21

What mount can we see?

/var

Gain initial access with ProFtpd

What is the version?

1.3.5

How many exploits are there for the ProFTPd running?

4

We know that the FTP service is running as the Kenobi user (from the file on the share) and an ssh key is generated for that user.

No answer needed

We knew that the /var directory was a mount we could see (task 2, question 4). So we've now moved Kenobi's private key to the /var/tmp directory.

No answer needed

What is Kenobi's user flag (/home/kenobi/user.txt)?

After connecting to ssh using the "id_rsa" run cat user.txt to get the flag.

d0b0f3f53b6caa532a83915e19224899

Privilege Escalation with Path Variable Manipulation

What file looks particularly out of the ordinary?

/usr/bin/menu

Run the binary, how many options appear?

3

We copied the /bin/sh shell, called it curl, gave it the correct permissions and then put its location in our path. This meant that when the /usr/bin/menu binary was run, its using our path variable to find the "curl" binary.. Which is actually a version of /usr/sh, as well as this file being run as root it runs our shell as root!

No answer needed

What is the root flag (/root/root.txt)?

Run cat /root/root.txt to get the flag.

177b3cd8562289f37382721c28381f02