Chill Hack


Intro

Room Info

πŸ”— Name

🎯 Target IP

10.10.141.41

πŸ“ˆ Difficulty level

🟒Easy

πŸ’² Subscription type

Free

🐧 OS

Linux


Recon

Start Reconnaissance

Enumerate Web server directories

Navigate to

  • http://chillhack.thm/secret/

  • input a command. It works, a Command Injection vulnerability is present in the web server.


Exploitation

Input a command to get a reverse shell

Reverse Shell as www-data user

Get a Full TTY shell on the server

/home/apaar/.helpline.sh file can be run by the www-data user as user apaar

Get a shell as user apaar

"apaar" shell

Privilege Escalation

Use SSH Port Forwarding to access the local open port 9001.

Stabilize with a SSH connection by generating a SSH key and put it into the apaar's user authorized_keys

Navigate to

  • http://chillhack.thm:9001/

index.php
account.php

This part can be skipped directly to SCP download of the necessary hacker-with-laptop_23-2147985341.jpg file.

Enumerate MySQL with root:!@m+her00+@db

  • Check the two password strings

πŸ“Œ Login credentials are:

Aurick:masterpassword

cullapaar:dontaskdonttell

Login to the portal http://chillhack.thm:9001/. The successful login redirect to hacker.php page where there is a hacker with laptop .jpg file that needs to be downloaded.

hacker.php

Download the hacker-with-laptop_23-2147985341.jpg file using scp

Check the image file with steghide

Crack Zip

Check the unzipped file

Decrypt the base64 hash

πŸ“Œ anurodh:!d0ntKn0wmYp@ssw0rd

anurodh

anurodh is in the docker group. Spawn a root shell by using a docker command.


Persistence (extra)


Last updated

Was this helpful?