21/tcp open ftp vsftpd 3.0.3
22/tcp open ssh OpenSSH 7.5 (protocol 2.0)
80/tcp open http Apache httpd 2.4.27 ((Unix))
FTP password found in MP3 file
Base64 string located in text files in ftp root give ssh credentials once decoded
Chown running on /usr/src as the root user allows attacker to generate and execute files as the root user.
Looks like others have been working on it so revert it.
Download secret_ultimate with wget as you cant view it and cat the file
Someone else has some form of shell on it.
This is worth looking at
Visit the dir and download the mp3
Strings, binwalk exiftool and steghide bring back nothing and the MP3 file gives little away. Analyse the file with audacity.
This revealed little so we searched around and found another mp3 analysing tool called sonic visualiser and eventually found some creds by viewing the track in Spectogram:
Creds for FTP:
Download everything and see if you can traverse paths with the browser:
To download all of the files use wget:
There is a lot of junk in these files but I am sure it is useful so ls all of the files to a file called list and break them up with an ugly bash command so you can see if there is anything interesting in any of the files:
I found 2 base64 strings hidden in the text:
The key file looks like a ssh key so chmod 400 it for the future while we work on these strings as I am guessing they are a password of some form and it does not work for ssh.
The longer string looks like cyphertext
Eventually we discovered it was generated using seccure:
Create the following python script and execute:
Now login to the ssh with the key password
Download all your tools to /dev/shm and run
If we migrate to that user we may be able to escape vi to root but we have no credentials
Nothing else useful came back from the script, search around for files like .py .sh etc:
Searches for every text file and there are not that many but at the bottom we find:
Read the file:
Move to the dir and see if there is anything else useful
Ok that file is owned by root so create another file called test in the dir and see if that changes if there is some sort of script running.
After a while we discover that chown is running and has changed our file ownership to nobody so we can use touch --reference=thoughts.txt to change a file to be owned by root.
Check if this works by removing test and creating another file called ownedbyroot?
After a few minutes we see it has changed to roots ownership:
Create a suid.c file
Download the suid.c file to shrek and compile it then chmod 4755 root, wait around 5 minutes then run the file once it is owned by root.