-
[HTB] Beep WriteupWargame/Hack The Box 2022. 1. 16. 21:31
Port Scanning
nmap -sC -sS -sV -O -p- -o scanResult.txt 10.129.206.83
Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-14 08:04 KST Nmap scan report for 10.129.206.83 Host is up (0.19s latency). Not shown: 65519 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3 (protocol 2.0) | ssh-hostkey: | 1024 ad:ee:5a:bb:69:37:fb:27:af:b8:30:72:a0:f9:6f:53 (DSA) |_ 2048 bc:c6:73:59:13:a1:8a:4b:55:07:50:f6:65:1d:6d:0d (RSA) 25/tcp open smtp? |_smtp-commands: Couldn't establish connection on port 25 80/tcp open http Apache httpd 2.2.3 |_http-server-header: Apache/2.2.3 (CentOS) |_http-title: Did not follow redirect to https://10.129.206.83/ 110/tcp open pop3? |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_ssl-date: ERROR: Script execution failed (use -d to debug) |_sslv2: ERROR: Script execution failed (use -d to debug) |_tls-alpn: ERROR: Script execution failed (use -d to debug) |_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug) 111/tcp open rpcbind 2 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2 111/tcp rpcbind | 100000 2 111/udp rpcbind | 100024 1 939/udp status |_ 100024 1 942/tcp status 143/tcp open imap? |_imap-ntlm-info: ERROR: Script execution failed (use -d to debug) |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_ssl-date: ERROR: Script execution failed (use -d to debug) |_sslv2: ERROR: Script execution failed (use -d to debug) |_tls-alpn: ERROR: Script execution failed (use -d to debug) |_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug) 443/tcp open ssl/http Apache httpd 2.2.3 ((CentOS)) | http-robots.txt: 1 disallowed entry |_/ |_http-server-header: Apache/2.2.3 (CentOS) |_http-title: Elastix - Login page | ssl-cert: Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=-- | Not valid before: 2017-04-07T08:22:08 |_Not valid after: 2018-04-07T08:22:08 |_ssl-date: 2022-01-14T00:14:59+00:00; +1h00m01s from scanner time. 942/tcp open status 1 (RPC #100024) 993/tcp open imaps? 995/tcp open pop3s? 3306/tcp open mysql? |_mysql-info: ERROR: Script execution failed (use -d to debug) |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_ssl-date: ERROR: Script execution failed (use -d to debug) |_sslv2: ERROR: Script execution failed (use -d to debug) |_tls-alpn: ERROR: Script execution failed (use -d to debug) |_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug) 4190/tcp open sieve? 4445/tcp open upnotifyp? 4559/tcp open hylafax? 5038/tcp open asterisk Asterisk Call Manager 1.1 10000/tcp open http MiniServ 1.570 (Webmin httpd) |_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1). No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ). TCP/IP fingerprint: OS:SCAN(V=7.91%E=4%D=1/14%OT=22%CT=1%CU=37171%PV=Y%DS=2%DC=I%G=Y%TM=61E0B35 OS:B%P=x86_64-pc-linux-gnu)SEQ(SP=C7%GCD=1%ISR=CE%TI=Z%CI=Z%II=I%TS=A)OPS(O OS:1=M505ST11NW7%O2=M505ST11NW7%O3=M505NNT11NW7%O4=M505ST11NW7%O5=M505ST11N OS:W7%O6=M505ST11)WIN(W1=16A0%W2=16A0%W3=16A0%W4=16A0%W5=16A0%W6=16A0)ECN(R OS:=Y%DF=Y%T=40%W=16D0%O=M505NNSNW7%CC=N%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS% OS:RD=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=16A0%S=O%A=S+%F=AS%O=M505ST11NW7%RD=0% OS:Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z% OS:A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y% OS:DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIP OS:L=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S) Network Distance: 2 hops Service Info: Host: 127.0.0.1 Host script results: |_clock-skew: 1h00m00s OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 854.46 seconds
다양한 서비스가 활성화되어있었지만, Web쪽 먼저 보기로 했다.
elastix의 알려진 취약점 검색 결과 LFI 취약점이 있어서 시도해보았다.
searchsploit elastix searchsploit -m 37637
실제로 LFI 가 가능했고, /etc/amportal.conf 파일에서 관리자 패스워드를 획득 할 수 있었다.
dirb 결과 나오는 /admin 페이지에 해당 패스워드로 로그인 할 수 있다.
...하지만 이게 함정이었다. 여기서부터 freepbx 관련해서 엄청난 삽질을 했지만, 별 소득이 없었다. 10000 port의 webmin 또한 마찬가지였다.
... 몇시간동안 삽질 후 ...
초심으로 돌아가 스캔 결과부터 다시 살펴보다가 설마 하고 ssh로 이전에 얻은 관리자 패스워드를 통해 로그인을 시도했더니, 루트 권한으로 접속에 성공해서 플래그를 획득할수있었다..
한가지 얻은 점은, ssh 연결 시 no matching key exchange method found. 에러가 발생할경우 아래와 같이 옵션을 넣어주면 된다는 것이다.
ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 root@10.129.1.140
FLAG =
[user] fdc78c386ae57875bce9d24155ea4e31
[root] c3c0585be5dca85993753914ec571a63
반응형'Wargame > Hack The Box' 카테고리의 다른 글
[HTB] Arctic Writeup (0) 2022.01.19 [HTB] Sense Writeup (0) 2022.01.17 [HTB] Granny Writeup (0) 2022.01.13 [HTB] Optimum Writeup (0) 2022.01.11 [HTB] Shocker Writeup (0) 2022.01.08