Skip to main content

27 VM Lin.Security

A. http://www.hackingarticles.in/hack-the-lin-security-vm-boot-to-root/ [login with the user/pwd provided at the vulnhub page to perform priv escalation,  unable to get shell, rpcinfo, showmount, rpcbind, nfs ]



Nmap scan report for 192.168.117.5
Host is up (0.00051s latency).
Not shown: 997 closed ports
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.6p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
111/tcp  open  rpcbind 2-4 (RPC #100000)
2049/tcp open  nfs_acl 3 (RPC #100227)

34203/tcp open  nlockmgr 1-4 (RPC #100021)
39865/tcp open  mountd   1-3 (RPC #100005)
50125/tcp open  mountd   1-3 (RPC #100005)
57253/tcp open  mountd   1-3 (RPC #100005)

UDP open                  sunrpc[  111]         from 192.168.117.5  ttl 64
UDP open                   shilp[ 2049]         from 192.168.117.5  ttl 64

MAC Address: 08:00:27:D8:9F:D6 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
00000000000000000000000000000000
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Jul 17 21:48:59 2018 -- 1 IP address (1 host up) scanned in 7.99 seconds

00000000000000000000000000000000
root@kali:~/reports/192.168.117.5# showmount -e 192.168.117.5
Export list for 192.168.117.5:
/home/peter *
root@kali:~/reports/192.168.117.5#
00000000000000000000000000000000


root@kali:~# rpcinfo -p 192.168.117.5
   program vers proto   port  service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
    100005    1   udp  42010  mountd
    100005    1   tcp  57253  mountd
    100005    2   udp  34061  mountd
    100005    2   tcp  39865  mountd
    100005    3   udp  34234  mountd
    100005    3   tcp  50125  mountd
    100003    3   tcp   2049  nfs
    100003    4   tcp   2049  nfs
    100227    3   tcp   2049
    100003    3   udp   2049  nfs
    100227    3   udp   2049
    100021    1   udp  37189  nlockmgr
    100021    3   udp  37189  nlockmgr
    100021    4   udp  37189  nlockmgr
    100021    1   tcp  34203  nlockmgr
    100021    3   tcp  34203  nlockmgr
    100021    4   tcp  34203  nlockmgr

00000000000000000000000000000000
root@kali:~/reports/192.168.117.5# ls /mnt
root@kali:~/reports/192.168.117.5# mkdir /mnt/peter
root@kali:~/reports/192.168.117.5# mount 192.168.117.5:/home/peter /mnt/peter
root@kali:~/reports/192.168.117.5# ls /mnt/peter
root@kali:~/reports/192.168.117.5# ls -la /mnt/peter
total 32
drwxr-xr-x 5 1001 1005 4096 Jul 10 14:49 .
drwxr-xr-x 3 root root 4096 Jul 17 23:29 ..
-rw-r--r-- 1 1001 1005  220 Jul  9 14:53 .bash_logout
-rw-r--r-- 1 1001 1005 3771 Jul  9 14:53 .bashrc
drwx------ 2 1001 1005 4096 Jul 10 05:04 .cache
-rw-rw-r-- 1 1001 1005    0 Jul 10 05:04 .cloud-locale-test.skip
drwx------ 3 1001 1005 4096 Jul 10 05:04 .gnupg
drwxrwxr-x 3 1001 1005 4096 Jul 10 03:03 .local
-rw-r--r-- 1 1001 1005  807 Jul  9 14:53 .profile

00000000000000000000000000000000

created a user called peter on kali, id was already 1001, changed the group to 1005 (or default). I was able to see content of these dir but no valuable information. Added .ssh/authorized_files root public keys but still couldnt login from kali using keys. Getting following. unable to pass this step



can login using walkthru A

Comments

Popular posts from this blog

VM 9 : PHP Include And Post Exploitation

Walkthrough 1.        https://medium.com/@Kan1shka9/pentesterlab-php-include-and-post-exploitation-walkthrough-8a85bcfa7b1d 2.        Ine [] 3.        http://megwhite.com.au/pentester-lab-bootcamp-walkthrough-php-include-post-exploitation/ 4.        http://fallensnow-jack.blogspot.com/2014/07/pentester-lab-php-lfi-post-exploitation.html Notes: root@kali:~# nmap 10.0.0.12 Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-30 12:23 EDT Nmap scan report for 10.0.0.12 Host is up (0.00035s latency). Not shown: 999 filtered ports PORT    STATE SERVICE 80/tcp open   http MAC Address: 08:00:27:1F:12:24 (Oracle VirtualBox virtual NIC) Nmap done: 1 IP address (1 host up) scanned in 5.31 seconds root@kali:~# Enumerating port 80 Run dirb root@kali:~# dirb http://10.0.0.12/ ----------------- DIRB v2.22 By The Dark Raver...

VM 5: Vulnix :

Walkthru: A. https://mrh4sh.github.io/vulnix-solution [SMTP and Finger enumeration, creating linux user with specific UID, root squashing, ssh pwd cracking using medusa & hydra, logging using ssh keys, updating /usr/sbin/exportfs] B. http://overflowsecurity.com/hacklab-vulnix/ [ same as above. create ssh keys for root and copied to victim to login as root w/o recovering pwd] C. https://www.rebootuser.com/?p=988[ local bash shell from nfs] B. https://www.vulnhub.com/?q=vulnix&sort=date-des&type=vm [list of solutions] D. https://www.rebootuser.com/?p=988 [User Enumeration #1 – SMTP, Finger; Entry Point including hydra, Putty(using rlogin service), nfs (showmount,mount) ] Notes: - As you can see the root user is the only account which is logged on the remote  host.Now that we have a specific username we can use it in order to obtain more information about this user with the command  finger root@host . -  Another effective use of the finger...

VM 13 : Basic Pentest 1 csec

Notes: Walkthru: 1. https://medium.com/@evire/basic-pentesting-1-7251fb3e3f9e [ w/metasploi t using Wordpress t] 2. https://prasannakumar.in/infosec/vulnhub-basic-pentesting-1-writeup/ [ w/metasploit using ftp ] 3.  https://www.ceos3c.com/hacking/basic-pentesting-1-walkthrough/ [ by uploading php-reverse-shell in wordpress ] 4. http://k3ramas.blogspot.com/2018/02/basic-pentesting-1-walkthrough.html [  access wordpress config file to get pwd and access the DB ] 5.  https://cowsayroot.com/walkthrough-basic-pentesting-1/ [ Wpscan, ftp metasploit vulnerability, phpbash ] 6.   http://www.hackingarticles.in/hack-the-basic-penetration-vm-boot2root-challenge/    [use msfvenom to create  to create php shell to be uploaded in Wordpress ] 7.   https://d7x.promiselabs.net/2018/01/30/ctf-basic-pentesting-a-guide-for-beginners/ [adding command using using PHP] Notes:  Ports - 21...ProFTPD 1.3.3c - 22 openSSH 7.2p2 ubuntu ...