HackTheBox is an excellent platform for various pen-testers to increase their testing skills and knowledge.
Machine Level -EasyMachine Name -Blunder
Machine OS -Linux
Machine IP -10.10.10.191
Tools:
Nmap -Nmap is a fantastic tools for scanning the open ports, services and OS detection. You can use other tools other than nmap (which ever you are more comfortable with ) like masscan, SPARTA etc. to scan for open ports.
Method:
Scanning the machine is the first step(i.e. Enumeration).
Use the command sudo nmap -sSVS 10.10.10.191, this will scan for open ports and services on the host.
The scan shows port 21 and 80
Since port 21 seems to be closed , we have only port 80 to enumerate.
It's running Apache Server. Let's enumerate it.
A lot of text here. Maybe something interesting is in here like a username or a password, but only if we can login somewhere.
Let's do directory busting and see if we find something interesting.
Command is dirb http://10.10.10.191/
There's a admin page and a text file(robots.txt).
Let's visit the admin page.
We need a username and password.
Let's do more enumeration before we try to login.
robots.txt file does not have anything interesting.
Let's use wfuzz tool and see if find more hidden directories.
Command is
wfuzz -c -z file,/usr/share/wfuzz/wordlist/general/common.txt --hc 404 http://10.10.10.191/FUZZ.txt
( we are looking for text files).There's todo.txt file
Let's see it.
"fergus" , that's interesting , maybe it's a username. But we did not find any passwords.
Should we use the words present in the default page(port 80) and try brute force?
No, we should not. First lets enumerate the Bludit admin page.
I found a rastating git-hub page for Bludit Brute Force Mitigation Bypass.
The problem was that if you try to do normal brute force then the server would block your IP address after 10 attempts for a certain time span. However this script will spoof the IP address and you won't be locked out.
The script rastating made could do a brute force and does not gets blocked.
Modified script can be found here.
Let's first grab all the words from the web page.
We will use tool named cewl to grab all the words and save them in a file.
Command is
cewl -d 10 -m 1 http://10.10.10.191 > test.txt

All set , let's do the brute force attack.
It will take a minute, trying various passwords.
Password found!
Username is fergus
Password is RolandDeschain
Let's login in the admin page.
Login success.
Search for Bludit exploit on google and you should find this exploit.
Scroll down to see the module options.
Copy the modules exploit.
Open your metasploit using command msfconsole.
We need Bludit password ,username and the rhosts.
We know all of these.
Let provide these details.
All set, run the exploit.
Meterpreter shell opened.
Let' see what privileges we have.
Let's see if we can grab the user flag.
Failed. Most likely we do not have permission to access it.
Let's create a interactive shell and also escape the tty shell.
Command is python -c 'import pty; pty.spawn("/bin/bash")'
Let's try privilege escalation.
Use command su hugo
Seems like we need a password for hugo.
Let's do some enumeration and see if we find the password.
I found the password here. But seems to be encoded.
Copy the hash and use online tools to crack the hash.
So the password is Password120
Let's try it.
Success! Let's grab the user flag.
Moving on for the root flag.
Let's do sudo -l and see if we can do privilege escalation.
We can run this command and gain root privileges.
First let's search for this on google.
I found the exact command that we need to run (Exploit database , Exploit No. 47502)
Let's run the command
Thanks for reading.

Let's modify the script to our need.
Set the host , username and path of your password file that we just generated.All set , let's do the brute force attack.
It will take a minute, trying various passwords.
Password found!
Username is fergus
Password is RolandDeschain
Let's login in the admin page.
Login success.
Search for Bludit exploit on google and you should find this exploit.
Scroll down to see the module options.
Copy the modules exploit.
Open your metasploit using command msfconsole.
We need Bludit password ,username and the rhosts.
We know all of these.
Let provide these details.
All set, run the exploit.
Meterpreter shell opened.
Let' see what privileges we have.
Let's see if we can grab the user flag.
Failed. Most likely we do not have permission to access it.
Let's create a interactive shell and also escape the tty shell.
Command is python -c 'import pty; pty.spawn("/bin/bash")'
Let's try privilege escalation.
Use command su hugo
Seems like we need a password for hugo.
Let's do some enumeration and see if we find the password.
I found the password here. But seems to be encoded.
Copy the hash and use online tools to crack the hash.
So the password is Password120
Let's try it.
Success! Let's grab the user flag.
Moving on for the root flag.
Let's do sudo -l and see if we can do privilege escalation.
We can run this command and gain root privileges.
First let's search for this on google.
I found the exact command that we need to run (Exploit database , Exploit No. 47502)
Let's run the command
sudo -u#-1 /bin/bash
Success. We are root now. Grab the root flag.Thanks for reading.
Comments
Post a Comment