sudo nmap 10.10.67.152
sudo nmap -A -p 21,22,80,111,139,445,2049 10.10.67.152
We don't get anythong interesting on the website.
We can list SMB shares and users:
In log.txt, we see that an RSA key pair has been created.
We have an NFS service we can list.
Let's connect to the NFS service. We should create a mount point.
We don't get any interesting information:
We discovered possible vulnerabilities in the version of ProFTPD that is in use.
CVE-2015-3306 allows us to copy any file from one location to another on the system where ProFTPD is running.
The exploitation process will be as follows:
Copy the id_rsa and /etc/passwd files to the mount point.
Access the files from the mount point. Since it is a read-only mount point, we need to manually copy the content of the files to use them.
It worked! We gained our first access to the machine and also obtained the user flag.
For provilege escalation, we try to find programs with the SUID bit set.
There is a program that is uncommon on Unix machines: /usr/bin/menu.
We can download the program to analyze it with Ghidra.
Ghidra allows us to decompile the file. We could also use the strings command to figure out what is happening.
Commands are not executed with their full path. Therefore, we can craft a command and add its location to the PATH variable.
We obtained the root flag this way.