lian_yu

Let’s start with our nmap scan.

nmap -sV 10.10.55.215

nmap

I found that the machine has web service on port 80, so I can use my web browser to try to get something.

browser

Nothing special!

Mmmmm… If I try to get robots.txt?*

robots

Bad luck!!, the website doesn’t have it.

Now I’m going to try with gobuster and maybe I can get some directories

gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://10.10.55.215/

gobuster1

Great! I found /island

I use this in my web browser again.

island1

I can see the text is not complete, so I’m going to try to see the source code.

¡¡¡Bingo!!!

island2

And now what? Is a good idea if I run gobuster again but this time in /Island directory

gobuster2

Perfect!! I found /2100 directory. I’m check the new directory in the browser.

2100

I watched the video and It was not helpful, maybe I need to see the source code again.

Okay!!! I got something interesting.

ticket

I spent many hours thinking what can I do here?, so after a few hours I thought that .ticket could be an extension, but where could it be used? I’ll use this right here at /2100, following the advice I found in he source code.

So let’s try gobuster again

gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://10.10.55.215/island/2100 -x .ticket

gobuster3

I found green_arrow.ticket and if I try to open the I find this.

green_arrow.png

I think the text is encrypt. Cipher are not a easy subject for me, so It will take me some time to get the correct way to decrypt the cipher. After some hours I found the correct way to decrypt the cipher using base58

base58

Okay! Let’s try to login using FTP with the credentials that I found

ftp

Great!!! I’m in!!

I’m going to use ls for list all files and directories.

ls

Downloading the images

download

Maybe the machine has other users, so It is a good idea to check home directory.

home

If I verify the images headers with exiftool I got this error in one of the three images

leave

I’m goingt to fix the image usign hexedit but first I need the PNG Hex Gradient

hex1

Now I can fix the PNG image.

hex1

Using ** steghide ** for Verify if the images have embed information

teg2

Extracting the zip from aa.jpg

From the zip file I got the files passwd.txt and shado

zip

I think that I have the corrects shh credentias.

I log in with with the ssh credentials and I run ls command to try to get user.txt

user

I got it!!!

So now I’m going to verify if i can run sudo command.

This is interesting, I can run pkexec with sudo.

pkexec

sudo pkexec --user root /bin/bash

Perfect!! I found root.txt

root

Happy Hacking!!!


Douglas Orellana

Happy Hacking!!!