symbolsBola

Let's Download and start the Docker container

Reconnaissance

We'll find two open ports. http://172.17.0.2:12345 connect to http. Since it showed me nothing, I decided to search hidden directories using dirsearch.

Great, we've just found the json list of users. So here is the idea of getting access.

Exploit

  1. Taking every username listed in json form

  2. Bruteforcing their passwords on SSH port using hydra

Here is the python script that allows you to get list of usernames.

Login as steven user using SSH. steven@172.17.0.2 Then I ran linpeas.sh arrow-up-righttool in order to find any useful information. Then, it seemed that .bash_history file contained vaild information.

Very well!!! We've just found MD-5 hashed passwords of users. Crack the hashes using john/hashcat or even CrackStationarrow-up-right.

The one user containing suspicious key word is baluadmin.balueadmin:estrella

After logging in as bluadmin, I've checked what are sudo command I'm allowed to run without any password of root.

Root

GG. Since it was interesting for me to find out what was inside secretitosecretazo.zip file, I extracted it as a root.

Last updated