Umbrella

Room Link: https://tryhackme.com/r/room/umbrellaarrow-up-right

Scans

Initial scan

Kali

nmap -A $VICTIM

Longer scan

Kali

TCP/5000 - Docker Registry

List repositories

Kali

Get tags of a repository

Kali

Get manifests

Inside the manifest we find potential credentials

Kali

TCP/3306 - MySQL

Kali

Kali(mysql)

Kali

hash.txt

Kali

output

TCP/22 - SSH

Kali

Privilege Escalation

In Claire's home directory we see the files that host the website. We can see the timeCalc uses the eval statement which is vulnerable.

Victim

TCP/80:443 - HTTP(s)

Kali

Login

Payload

Full TTY Shell

Docker Breakout

Exploit: https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalationarrow-up-right

Privilege Escalation with 2 shells and host mount

If you have access as root inside a container that has some folder from the host mounted and you have escaped as a non privileged user to the host and have read access over the mounted folder. You can create a bash suid file in the mounted folder inside the container and execute it from the host to privesc.

Victim(root)

Victim(claire-r)

Last updated