Resource HTB
Resource Linux HackTheBox labs.
Last updated
Was this helpful?
Resource Linux HackTheBox labs.
Last updated
Was this helpful?
Add the domain to the /etc/hosts file.
Enumeration doesn't show anything special expect that signserv.ssg.htb page.
ffuf -c -w /home/ayra/Tools/SecLists-master/Discovery/Web-Content/raft-medium-directories.txt -u http://itrc.ssg.htb/?page=FUZZ -b "PHPSESSID=34kfe2j23j3fe02af65d4058f0777d73103" -recursion -fs 3120
The vulnerability seems to be in the ticket publication.
Let's build a reverse shell inside the zip file.
Let's upload the zip file.
Now the goal would be to find a way to trigger this zip file in order to get a shell.
We can see that our zip file is hashed and saved inside /uploads folder.
http://itrc.ssg.htb/uploads/adcf72f78a390faffddaa7065c7aff7c57b35c5c.zip
I can't lunch the reverse directly. To bypass that, we can test various protocol like dict://
, file://
, etc. We can exploit a phar://
vulnerability.
So by running this payload ;
We got a shell.
Now we are connected to the server as www-data, the goal would be to escalate to a user account. After some search, I found that php file with a database credential.
Let's explore this.
We found 7 users, 2 admins with a Bcrypt encryption.
We can tell it's a Bcrypt hash by the start with $2y
and $10$
who stand for the cost factor.
Bcrypt in a one-way hashing fonction with a special cost factor parameter which make it hard to bruteforce.
At least we know two admins now, we could try to focus our research on them.
In the /uploads folder, there is other .zip which is not coming from our side, if we investigate them with admin name's in key word, we can get those credentials.
for zipfile in uploads/*.zip; do zipgrep "zzinter" "$zipfile"; done
for zipfile in uploads/*.zip; do zipgrep "msainristil" "$zipfile"; done
Those credentials work for an ssh connection.
We found an RSA key pair.
The CA private key ca-itrc
has the capability to sign other public keys, thus generating a certificate that systems recognize as trustworthy. This differs from a standard SSH private key because it functions as a trusted authority within an SSH ecosystem, enabling efficient and scalable management of SSH credentials.
The CA public key is ca-itrc.pub
which is a result of ssh-keygen -y -f ca-itrc
First,
ssh-keygen -t rsa -b 2048 -f shinyNewKey
ssh-keygen -s ca-itrc -I ca-itrc.pub -n zzinter shinyNewKey.pub
ssh-keygen -Lf shinyNewKey-cert.pub
chmod 600 shinyNewKey-cert.pub
ssh -o CertificateFile=shinyNewKey-cert.pub -i shinyNewKey zzinter@10.129.184.106
We can use the same methodology to get root access.
ssh-keygen -t rsa -b 2048 -f rootkey
ssh-keygen -s ca-itrc -I ca-itrc.pub -n root rootkey.pub
chmod 600 ca-itrc.pub
ssh -o CertificateFile=rootkey-cert.pub -i rootkey root@localhost
We can't find the root flag at this point. All the config files on the server make us thinking we're inside a container and there is others areas to explore. Our nmap scan showed us two SSH port, 22 and 2222, which make us thinking the port 22 is the docker container hosting the app and the port 2222 is the server.
Each file lists the principals that are allowed to authenticate as the specific user.
Let's make a SSH connection to zzinter with the previous methodology.
We have a file with sudo privilege
This bash script can be vulnerable to a brute force abusing wildcards.
We end ups with a private key :
Now, the same CA signing methodology again :
To stabilize the shell follow .
(script from )
(script from )