Nebula

Nebula

Nebula is an easy difficulty Linux machine from HackMyVM platfrom! VM Link

Enumeration

>> Find the IP address of our Target in our virtual network, with netdiscover

  • Our target ip is 192.168.209.4

>> Scan for open Ports and services with nmap

  • A web server on port 80

  • By visiting the browser we get page like this!

>> Brute Force files and subdirectories with gobuster

  • /login and joinus looks intresting

  • /joinus gives us access to a PDF to join. In pdf there is this information.

  • With username & password we can log in to /login

  • admin:d46df8e6a5627debf930f7b5c8f3b083

  • And we got access to dashboard! there is some functionality for search centrals & meeting room

  • Url looks vulnerable to SQL Injection

  • Let's Try running sqlmap

  • Got database called nebuladb, lets try to dump

  • Got Many juice stuff!!!

  • On the dashboard its mentioned, if you are from PMC central log in with SSH.

  • So, log in ssh with pmccentral:999999999 (password got from the dump)

Exploitation

  • By roaming around found out that there is two user pmclaboratoryadmin & pmccentral

  • We can run /usr/bin/awk as a laboratoryadmin

  • Let's Exploer GTFObins to that with awk beign able to execute sudo

  • lets run this command as user laboratoryadmin

  • And BOOM we got access to laboratoryadmin

  • And we got the user flag!!! 👾

Privilege escalation

  • Also we have directory named autoScripts and it has two file called head and PMCEmployees

  • PMCEmployees looks some kind of script contains binary code!

  • Lets look for strings of the PMCEmployees with strings command

  • Look closely we got something : Showing top 10 best employees of PMC company head /home/pmccentral/documents/employees.txt

  • The program or script runs as root, calls the head program, which is usually in /usr/bin/head.

  • In /home/laboratoryadmin/autoScripts we have head file which executes bash -p command.

  • Let's add this path to a $PATH.

  • Now if we run PMCEmployee we'll have a root shell.

  • And Finally We have the ROOT Flag!! 🚨

Last updated