NULLBYTE
Scanning
Nmap
➜ ~ sudo nmap -A -p- -T4 nullbyte.vuln
Starting Nmap 7.91 ( https://nmap.org ) at 2021-08-13 11:51 EDT
Nmap scan report for nullbyte.vuln (172.16.129.141)
Host is up (0.0014s latency).
Not shown: 65531 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.10 ((Debian))
|_http-server-header: Apache/2.4.10 (Debian)
|_http-title: Null Byte 00 - level 1
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100024 1 34372/tcp6 status
| 100024 1 45260/tcp status
| 100024 1 53470/udp6 status
|_ 100024 1 58576/udp status
777/tcp open ssh OpenSSH 6.7p1 Debian 5 (protocol 2.0)
| ssh-hostkey:
| 1024 16:30:13:d9:d5:55:36:e8:1b:b7:d9:ba:55:2f:d7:44 (DSA)
| 2048 29:aa:7d:2e:60:8b:a6:a1:c2:bd:7c:c8:bd:3c:f4:f2 (RSA)
| 256 60:06:e3:64:8f:8a:6f:a7:74:5a:8b:3f:e1:24:93:96 (ECDSA)
|_ 256 bc:f7:44:8d:79:6a:19:48:76:a3:e2:44:92:dc:13:a2 (ED25519)
45260/tcp open status 1 (RPC #100024)
MAC Address: 00:0C:29:72:55:45 (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 1.42 ms nullbyte.vuln (172.16.129.141)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.42 secondsEnumeration
port 80
landing page

Whatweb
Check directory
This challenge is CTF style ...
IMG Metadata
lets check metadata of landing page image
this line is interesting
Comment : P-): kzMb5nVYJw

intercept this page

brute forcing the only way
Exploiting
Brute forcing key
go for burp intruder

for payload i will use Seclists SecLists/Passwords/Common-Credentials/10k-most-common.txt
elite is the key

press <enter_key> only empty input

SQLmap
SQLmap against this input field
Remember
we have /phpmyadmin directory gobuster output
Credentials : root:sunnyvale
phpMyAdmin

dive to Database: seth Table: users

Credentials : ramses pass is hashed lets crack it :)
YzZkNmJkN2ViZjgwNmY0M2M3NmFjYzM2ODE3MDNiODE
decode base64
c6d6bd7ebf806f43c76acc3681703b81
crack the hash
omega i used hashes.com for hole process
Credentials : ramses:omega
SSH Connection
now lets connect to machine using SSH port 777
Privilege Escalation
SUID binary
this file looks ... interesting :joy: /var/www/backup/procwatch lets take a look ...
this file trigger ps command lets abuse it
Last updated