This series will follow my exercises in HackTheBox. All published writeups are for retired HTB machines. It is against their rules to publish a writeup for an active machine. Whether or not I use Metasploit to pwn the server will be indicated in the title.
Machine IP: 10.10.10.3
I always start enumeration with AutoRecon.
It’s an incredibly useful tool to automate a series of enumeration tasks you would normally perform manually.
With the tool installed -
sudo python3 autorecon.py 10.10.10.3.
Note that some of the commands
autorecon will run - such as nmap’s UDP scan - require
I see that nmap’s initial scans have discoverd NetBIOS running on
TCP/445, FTP on
TCP/21, and SSH on
For each discovered service, autorecon runs additional scans to pull a good amount of information.
While autorecon continues its scans, I can look at what it has found so far.
results/10.10.10.3/scans I have a
_quick_tcp_nmap.txt file displaying the full stdout of the quick full-connect nmap scan that autorecon ran.
I see that FTP allows anonymous login - let’s see if there are any goodies.
Hm, doesn’t appear that anything exists. Although, I may be able to use it to push files onto the server if I need to execute a payload. Let’s see if autorecon has completed.
It has, and I’ve discovered another open service - distccd on
Let’s see what additional discovery autorecon has launched against this open port.
I can see that it ran an nmap scan with the following NSE scripts:
And the target is vulnerable!
“Daemon command execution” sounds very promising.
Let’s see what I have to work with.
Let’s open Metasploit.
Starting with Kali 2020.1, remember that you should run
sudo msfconsole to give Metasploit sudo privileges, which are required for some exploits.
I’ll also create a workspace for the target.
Now let’s see whether there is anything related to distccd in Metasploit already.
Great! There’s a ready-to-go exploit for command execution against the distccd daemon for the vulnerability I discovered from nmap.
Let’s use the exploit and configure it against the target,
What? I spent several minutes here trying to understand what part of my Kali instance was borked before checking the HTB panel and realizing the server had gone down. After restarting the server and navigating back to our exploit…
Now that’s what I’m talking about.
I can see I have a user shell and am the
I still need to escalate my privileges to root.
But I can get my flag for the user shell.
Now to see how to escalate my privileges…
ps aux, I look for interesting services.
udev catches my eye.
I see several known local privilege escalation exploits against
Searchsploit is a convenient CLI tool to query a local cache of https://www.exploit-db.com/’s database.
I choose the
exploits/linux/local/8572.c exploit arbitrarily.
Looking at the details of the exploit with
I need to pass the PID of the udev netlink socket.
The exploit will then run the arbitrary code located at
A quick Google search tells me that I can find the Netlink process IDs via:
2687 for later.
Now I need to get the exploit onto my target and compile it.
Let’s host the uncompiled exploit on a local web server.
I can verify it is available with a curl command.
I retrieve the exploit code on my user shell on the target machine with wget.
And now I can compile it on the target, which ensures it is compiled for the right architecture.
Now I need to add a payload to
I’d like for the target to create a reverse listener and have it connect to my machine.
Let’s add the payload.
Now let’s set up a listener on our machine.
This tells netcat to listen on local port 5555 without performing DNS resolution.
I also use
-v for verbose output.
Now I can run our exploit with my retrieved PID of
And there it is. I can now retrieve the root flag.
In the official writeup, there is a much easier exploit to take advantage of.
TCP/445 reveal the presence of a Samba share on the target.
We can use Metasploit’s
And just like that, I have a root shell on the machine. From here I can read the user flag and root flag with no additional work.
I will say I do like my method for this initial box, as I had to do much more ‘work’ myself and understand what was happening. That being said, it took me about 30 minutes to complete this box when it could have taken about 1 minute! I imagine my technique to root this box without Metasploit will closely resemble my method above.