Nebula
Nebula is an easy difficulty Linux machine from HackMyVM platfrom! VM Link
Enumeration
>> Find the IP address of our Target in our virtual network, with netdiscover
Our target ip is
192.168.209.4
>> Scan for open Ports and services with nmap
A web server on port 80
By visiting the browser we get page like this!
>> Brute Force files and subdirectories with gobuster
/loginandjoinuslooks intresting/joinusgives us access to a PDF to join. In pdf there is this information.
With username & password we can log in to
/loginadmin:d46df8e6a5627debf930f7b5c8f3b083And we got access to dashboard! there is some functionality for search centrals & meeting room
Url looks vulnerable to SQL Injection
Let's Try running
sqlmap
Got database called
nebuladb, lets try to dump
Got Many juice stuff!!!
On the dashboard its mentioned, if you are from PMC central log in with SSH.
So, log in ssh with
pmccentral:999999999(password got from the dump)
Exploitation
By roaming around found out that there is two user
pmclaboratoryadmin&pmccentral
We can run /usr/bin/awk as a laboratoryadmin
Let's Exploer GTFObins to that with awk beign able to execute sudo
lets run this command as user laboratoryadmin
And BOOM we got access to laboratoryadmin
And we got the user flag!!! 👾
Privilege escalation
Also we have directory named autoScripts and it has two file called
headandPMCEmployeesPMCEmployeeslooks some kind of script contains binary code!Lets look for strings of the
PMCEmployeeswithstringscommand
Look closely we got something : Showing top 10 best employees of PMC company head /home/pmccentral/documents/employees.txt
The program or script runs as root, calls the
headprogram, which is usually in/usr/bin/head.In
/home/laboratoryadmin/autoScriptswe haveheadfile which executesbash -pcommand.Let's add this path to a $PATH.
Now if we run PMCEmployee we'll have a root shell.
And Finally We have the ROOT Flag!! 🚨
Last updated