Kotarak

"Challenging" box from Hack The Box 10.10.10.55

Scanning and Enumeration

└─# nmap -sC -sV -p22,8009,8080 10.10.10.55 
Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-10 22:05 EDT
Nmap scan report for 10.10.10.55
Host is up (0.10s latency).

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 e2:d7:ca:0e:b7:cb:0a:51:f7:2e:75:ea:02:24:17:74 (RSA)
|   256 e8:f1:c0:d3:7d:9b:43:73:ad:37:3b:cb:e1:64:8e:e9 (ECDSA)
|_  256 6d:e9:26:ad:86:02:2d:68:e1:eb:ad:66:a0:60:17:b8 (ED25519)
8009/tcp open  ajp13   Apache Jserv (Protocol v1.3)
| ajp-methods: 
|   Supported methods: GET HEAD POST PUT DELETE OPTIONS
|   Potentially risky methods: PUT DELETE
|_  See https://nmap.org/nsedoc/scripts/ajp-methods.html
8080/tcp open  http    Apache Tomcat 8.5.5
|_http-favicon: Apache Tomcat
| http-methods: 
|_  Potentially risky methods: PUT DELETE
|_http-title: Apache Tomcat/8.5.5 - Error report
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

PORT      STATE SERVICE
22/tcp    open  ssh
8009/tcp  open  ajp13
8080/tcp  open  http-proxy
60000/tcp open  unknown

PORT

STATE

SERVICE

VERSION

22

Open

SSH

OpenSSH 7.2p2

8009

Open

AJP13

Apache Jserv (Protocol v1.3)

8080

Open

HTTP

Apache Tomcat 8.5.5

Port 6000

Checking for useragent on proxy

There is none, there for we will use BurpSuite to find other information that could be of value to us.

When we set the path to file, we get a 'try harder error message' when we set the path to the page itself we get that page by itself. Knowing this, we can use wfuzz to find internal ports.

Found credential via port 888

username: admin

password: 3@g01PdhB!

Access gained, now that we have access, lets see if we can upload a shellaroo up inside this badboi.

Using MSFVenom

Connection Established.

Exploring Tomcat after initial access we were able to find a .dit file and a .bin file from previous pentest data.

This is useful because:

  • ntds are stored on windows active directory controllers. Its what contains windows domain innformation including users and passwords.

Running file on the found files we learn that:

the .bin file is a MS Windows registry file. We can assume this is a system hive file which contains the boot key that allows you to decrypt the .dit file. Lets transfer these files over to our KALI machine.

After you transfer the files, use impacket to to parse critical information that could be of use to us.

Usernames of interest:

  • Administrator

  • atanas

Using the f16 password

Looking through files we were able to find a app.log file

Looks like we have remote code exeuction for versions less than 1.18. Which is the cas here.

Root attained

Last updated

Was this helpful?