Bola

Let's Download and start the Docker container
Reconnaissance
We'll find two open ports. http://172.17.0.2:12345 connect to http. Since it showed me nothing, I decided to search hidden directories using dirsearch.
Great, we've just found the json list of users. So here is the idea of getting access.
Exploit
Taking every username listed in json form
Bruteforcing their passwords on SSH port using hydra
Here is the python script that allows you to get list of usernames.
Login as steven user using SSH. steven@172.17.0.2 Then I ran linpeas.sh tool in order to find any useful information. Then, it seemed that .bash_history file contained vaild information.
Very well!!! We've just found MD-5 hashed passwords of users. Crack the hashes using john/hashcat or even CrackStation.
The one user containing suspicious key word is baluadmin.balueadmin:estrella
After logging in as bluadmin, I've checked what are sudo command I'm allowed to run without any password of root.
Root
GG. Since it was interesting for me to find out what was inside secretitosecretazo.zip file, I extracted it as a root.
Last updated