Obscure
Room Link: https://tryhackme.com/r/room/obscured
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/21 - FTP
Kali
Kali(ftp)


Kali
We find a function that checks if the password is equal to 971234596, if it is the program gives us the password.
Kali

Kali

Login Credentials
Initial Shell
exploit: https://www.exploit-db.com/exploits/44064
In order to exploit the vulnerability, you should navigate to the Apps page (the link is in the navigation bar at the top and search for and install Database Anonymization in the search bar. We have to deselect the Apps filter in the search bar for it to show up.

Install Database Anonymization

Once we have the module installed, we navigate to the settings page and select Anonymize database under Database anonymization and click on the Anonymize Database button.


exploit.py
Kali
Next, we refresh the page and navigate to the same page under settings. We upload the exploit.pickle file generated our script and click on Reverse the Database Anonymization button. We should have a reverse shell.


Victim

Netcat
Kali(receiving)
Victim(sending)
Lateral Movement #1
Kali


Kali
Kali
Kali(gdb)

This tells us it crashes after 136 characters
Kali

We see the win function is located at 0x400646
Kali

Confirmed it crashes after 136.
Kali

I wanted to confirm it would crash where we expected so I added the program into a for loop
payload.py - version 2
We can see 137 did work on our local box and got us to the win function when adding it's address to the script
Kali

Now to create our payload and send it to the victim
payload.py - version 2
Testing that the payload still works on our local machine.
Kali

Kali
We are root but only within the docker container.
Victim

Lateral Movement #2
Victim(root)


Victim(root)

Victim(zeeshan)


Victim

id_rsa has no password so we can just login without cracking it
Kali

Privilege Escalation
Kali

Kali

Kali
Kali
Kali(gdb)

Kali(gdb)

Kali

final.py
Kali

Victim

Kali
final.py - version 2
Kali

Last updated