Vulhub - CyberSploit2
CyberSploit2 writeup
Link
https://www.vulnhub.com/entry/cybersploit-2,511/
Description
Solve
Import the ova file to Virtual Box and firstly, we use arp-scan to determine the target’s ip address
1
sudo arp-scan -I eth1 --localnet
and then use nmap to scan open ports on the target
The target has apache web server running on port 80. When access the server we have a table that seems to be credentials. I noted the table and then do some fuzzing on web server. I got no sensitive asset from webserver by using popular wordlist like seclist or rockyou, maybe we can find some interesting informations or hints from web source? Open the get request in BurpSuite and grep html comment, i saw a hint like bellow
We got ROT47 cipher, what does this mean? Maybe we have some ROT47 encoded data somewhere? Get back to the table, i found the ROT47
Decode 2 strings we got the ssh credential.
D92:=6?5C2->shailendra4J36CDA=@:E`->cybersploit1
Use the above credential to login shailendra
PRIVELEGE ESCALATION
We see that shailendra is not in sudo group. Firstly, we will find out that what kind of files we have write permission. The command i used to use is find / -type f -writable 2>/dev/null. No writable file can used to get root here, but i got another interesting file in the result.
That’s hint file in the home folder
shailendra user is really in docker group, easily mount /etc folder to one container and then edit shadow file to change root’s password. An example for mouting /etc folder to volume of a container is as the following
1
docker run -v /etc:/mnt -it alpine








