Entrada

Squashed - WriteUp

Squashed - WriteUp

🎯 Machine Info

Machine Squashed
Platform HTB
OS Linux
Difficulty Easy

Squashed




SQUASHED


NFS Imitation The plan now is to imitate the user with the UID of 2017 , try adding a php file containing our reverse shell to the webserver and then use our browser to trigger it.

NMAP

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
# Nmap 7.94SVN scan initiated Thu Jan 25 19:46:14 2024 as: nmap -sCV -p 22,80,111,2049,34021,34593,35533,55917 --stylesheet=https://raw.githubusercontent.com/honze-net/nmap-bootstrap-xsl/stable/nmap-bootstrap.xsl -oN targeted -oX targetedXML 10.129.228.109
Nmap scan report for 10.129.228.109
Host is up (0.059s latency).

PORT      STATE SERVICE  VERSION
22/tcp    open  ssh      OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 48:ad:d5:b8:3a:9f:bc:be:f7:e8:20:1e:f6:bf:de:ae (RSA)
|   256 b7:89:6c:0b:20:ed:49:b2:c1:86:7c:29:92:74:1c:1f (ECDSA)
|_  256 18:cd:9d:08:a6:21:a8:b8:b6:f7:9f:8d:40:51:54:fb (ED25519)
80/tcp    open  http     Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Built Better
111/tcp   open  rpcbind  2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100003  3           2049/udp   nfs
|   100003  3           2049/udp6  nfs
|   100003  3,4         2049/tcp   nfs
|   100003  3,4         2049/tcp6  nfs
|   100005  1,2,3      34593/tcp   mountd
|   100005  1,2,3      42071/udp6  mountd
|   100005  1,2,3      50611/tcp6  mountd
|   100005  1,2,3      54040/udp   mountd
|   100021  1,3,4      34391/tcp6  nlockmgr
|   100021  1,3,4      35533/tcp   nlockmgr
|   100021  1,3,4      43179/udp   nlockmgr
|   100021  1,3,4      54471/udp6  nlockmgr
|   100227  3           2049/tcp   nfs_acl
|   100227  3           2049/tcp6  nfs_acl
|   100227  3           2049/udp   nfs_acl
|_  100227  3           2049/udp6  nfs_acl
2049/tcp  open  nfs      3-4 (RPC #100003)
34021/tcp open  mountd   1-3 (RPC #100005)
34593/tcp open  mountd   1-3 (RPC #100005)
35533/tcp open  nlockmgr 1-4 (RPC #100021)
55917/tcp open  mountd   1-3 (RPC #100005)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

HTTP

Esta es la web, pero es estática y por ahora no la vamos a tocar:

SQUASHED

Nos vamos a centrar en enumerar el puerto 111 TCP y 2049 TCP - NFS

1
2
3
4
5
$ showmount -e 10.129.228.109

Export list for 10.129.228.109:
var    *
/var/www/html *

Vemos dos rutas que se pueden montar. Vamos a ello.

Nos ponemos como root y creamos una carpeta en la ruta /mnt/squashed.

Dentro de ella, creamos las carpetas ross y html y comanzamos:

1
2
3
$ mount -t nfs -o vers=3 10.129.228.109:/home/ross /mnt/squashed/ross -o nolock
...
$ mount -t nfs -o vers=3 10.129.228.109:/var/www/html /mnt/squashed/html -o nolock

Hacemos un tree rápido y solo tenemos acceso a un archivo. Es una base de datos de keepass. Nos la copiamos a nuestra carpeta e intentamos acceder a ella.

SQUASHED

Pero no tenemos suerte:

1
2
$ keepass2john Passwords.kdbx
! Passwords.kdbx : File version '40000' is currently not supported!

Tenemos que buscar otro camino…

![[Squashed (1).pdf]]

Ăšltima actualizaciĂłn: 2024-06-12
Autor: A. Lorente
Licencia: Creative Commons BY-NC-SA 4.0

Esta entrada está licenciada bajo CC BY 4.0 por el autor.