Uvalde

Writeup HackMyVM

In this walkthrough, I demonstrate how I obtained complete ownership of Uvalde from HackMyVM, A beginner friendly Linux Machine VM Link

Uvalde

Enumeration

>> Find the IP address of our Target in our virtual network, with netdiscover

  • Our target ip is 192.168.128.70

>> Scan for open Ports and services with nmap

  • 21/tcp open ftp vsFTPd 3.0.3

  • 22/tcp open ssh

  • 80/tcp open http

>> Check ftp connection with anonymous

  • Here we have User matthew looks intresting

>> Brute Force files and subdirectories with gobuster

  • here we have two intresting pages /login.php & /create_account.php

  • By creating account on /create_account.php we will get the response which stores the some base64

  • The username and password stored in this pattern, username=xxxx&password=xxxx2024@four-digit random number

  • So, assume that user matthew generated password the same way, so use crunch to generate list with same format.

>> Generate a dictionary list with crunch

Exploitation

>> Use hydra to crack passowrd of /login.php

>> Tried login via ssh in case matthew has reused password.

  • Well, We got the shell and our user flag!!

Privilege Escalation

>> Matthew has sudo permission to run /opt/superhack as any user.

  • By inspecting the script appears to be simple fake hacking tool.

  • Which just prints a string with progess bar and a message claiming that the target has been "PWNED"

  • This code itself is not offensive, but because it is executed by /bin/bash, it means that we can forge a file with the same name, execute the content written in the file, and then execute to obtain permissions.

  • We have both the flags!

Last updated