Vincent's Tyler KOTH writeup
Recon
nmap
# sh recon.sh 10.10.172.202
Host is up.
Starting Nmap 7.80 ( https://nmap.org )
[...]
Not shown: 992 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
80/tcp open http Apache httpd 2.4.6 ((CentOS) PHP/7.3.16)
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: SAMBA)
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: SAMBA)
3306/tcp open mysql MariaDB (unauthorized)
5000/tcp open http Werkzeug httpd 1.0.0 (Python 3.6.8)
8080/tcp open http nginx 1.16.1
9999/tcp open abyss?
Service Info: Host: TYLER
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 101.87 seconds
Raw packets sent: 1103 (48.508KB) | Rcvd: 1022 (40.912KB)Gobuster
Looking at a regular gobuster, there's nothing useful. I uploaded php_reverse_shell.php but I couldn't find where it was uploaded.
alert.txt
dirsearch.py
From here we find something called checkuser.php. Typing in tdurden replies with:
Typing narrator gives us:
SSH
ssh into narrator
app.py
Privilege Escalation
From here, you add narrator to the sudoers file:
After this, you type sudo -i to get to root.
After root
Go to PermitRootLogin and change the parameter from no to yes.
Last updated
Was this helpful?