Date
Apr 3, 2024 → Apr 4, 2024
Tag
Web
Linux
Local privilege escalation
腦經急轉彎
FTP
ELF
Scan
port
21 | FTP
22 | SSH
80 | HTTP
21 | FTP
this ftp allow Anonymous
find the file secret_stuff.txt, but don’t know how, change target
80 HTTP
the image has no infor
dirbsearch
path /robots.txt
Path /secret
the image dosen’t have any info
we need back to the ftp
back to FTP
again, for that file, found out it is a wireshark file, so we can analyze more.
Well, well, well, aren't you just a clever little devil, you almost found the sup3rs3cr3tdirlol :-P\n
After tried all things, sup3rs3cr3tdirlol is a web path!!!!!!!
no file under the path
download file roflmao
that is a ELF file
I need a Hit
Strings roflmao
we can find that there is a sentence “Find address 0x0856BF to proceed”
Here we have two chose 1. it is a address data 2. it is a web path
let try web path first, since it is more ez than other way.
nice chose!
enmeration
tried hydra to brute force the ssh
no result and also tired it as web path.
hit 2
use other brute force for ssh and think more, the path said the pass contain in the folder, if the info inside the txt file isn’t password, then what about the file name?
FIND!
Username | Password |
overflow | Pass.txt |
hit 3
since it will kick us off line, so the machine must have crontab, but i tried cannot access, so we can try find cronlog.
we can see there will be a scheduled task running every 2 min
we can see this python file can edit by us, so we can add a one line reverse shell into it.
WALA!!!!