Room : https://tryhackme.com/room/smaggrotto
Author : @jakeyee
Reconnaissance:
Let’s start with nmap
scan.
Discoverd 2 Ports, Let’s check port 80.
Enumeration:
From gobuster
result we will get directory called /mail
It has a pcap
file to download, let’s analize it with wireshark
.
Taking good look at it, We can find HTTP POST request to development.smag.thm/login.php
and also username and password that used to login on clear text.
Now add development.smag.thm
to our /etc/hosts
file.
There is a login portal, So now we can login with credentials we found on .pcap
file. and it will redirect to /admin.php
.
its a webshell, So let’s input reverse shell command to get reverse connection.
Spawn a python shell using ; python3 -c 'import pty;pty.spawn("/bin/bash")'
Enumerating further more we can see interesting job running on /etc/crontab
Here we can manipulate that to get user privilege.
We have write permission, So we can add our public key to /opt/.backups/jake_id_rsa.pub.backup
get User jake.
Now we can login via SSH
to user jake
without password.
Privilege Escalation:
Let’s check sudo privilege for jake
with command sudo -l
Now get exploit on GTFObins for /usr/bin/apt-get
to get root shell.
1
sudo apt-get update -o APT::Update::Pre-Invoke::=/bin/sh