Cap

TARGET IP: 10.10.10.245
HOST IP: 10.10.16.3
RECON
WEBSITE

Looks like a data analytics page that I am currently signed into as
Nathan.The dropdown menu page under the user doesn't do anything. All of the buttons including the
Logoutdon't point towards anything or do anything.Take a look at the source code:
There is a lot there but it looks like we have some new information:
We have a user named
Nathanand possibly other usersRashed,Kaji Patha, andRatul Hamba.
Checking out
curldoesn't give us the version number of thegunicornweb server.

If we go to the home tab in the upper right and click on
Network Status, we get some really good info about the machine without actually having to run an NMAP scan.Looks like Ports 21, 22, and 80 are open.

When I try something in the search bar, nothing pops up but a parameter is added to the URL.
I captured a packet with Burpsuite and received the following.

Let's try the
Security Snapshotbutton. This appears to grab some packet data over a 5 second period and creates apcapfile to look at.We can also see that the URL shows a
dataparameter that after first use equals 1 and sequentially goes up. Let's set the parameter to0and see what it spits out. We'll also grab thepcapfile from it.

We can open this
pcapfile in wireshark to take a look at it and see if we can find any good information.

WiresharkScanning through the Wireshark capture, we quickly find FTP credentials for the User
Nathan.

We can now log into
nathan's account, list out the current working directory, and download the user flag.

On our host system we can then look into the text file for the first flag.

WAPPALYZER

The backend Language appears to be Python
Utilizes Gunicorn as a webserver
The Gunicorn "Green Unicorn" is a Python Web Server Gateway Interface HTTP server. It is a pre-fork worker model, ported from Ruby's Unicorn project. The Gunicorn server is broadly compatible with a number of web frameworks, simply implemented, light on server resources, and fairly fast.
NMAP



ENUMERATION
GOBUSTER
SUBDOMAIN

None of these are new to me and don't provide any new information.

TARGET ENUMERATION
Now that we have credentials for
nathan. We can spend some time exploring the target system for possible privilege escalation.I'm going to use the credentials to log in through
SSH.

Try checking out what sudo privileges we have.

Unfortunately, we have none so let's go digging around.
I spent some time digging around myself but didn't find anything. I decided to upload a copy of linpeas to the target account and perform some auto enumeration to help out.
I came across something interesting.

I can verify the capability functions with the following command. This essentially allows for certain processes to have root privleges. Similar to SUID.

This is great information as having the capabilities for
cap_setuidset is a particularly vulnerable situation.Hacktricks and GTFOBins both have sections for exploiting this for privilege escalation.
Let's go with the privilege escalation from GTFOBins.

And now I have root privileges.
Let's go get the root flag.

Last updated