Chill Hack
Intro
Room Info

π Name
π― Target IP
10.10.141.41
π Difficulty level
π’Easy
π² Subscription type
Free
π§ OS
Linux
Recon
Start Reconnaissance
Enumerate Web server directories
Navigate to
http://chillhack.thm/secret/input a command. It works, a Command Injection vulnerability is present in the web server.

Exploitation
Input a command to get a reverse shell

Get a Full TTY shell on the server

/home/apaar/.helpline.sh file can be run by the www-data user as user apaar

Get a shell as user apaar

Privilege Escalation
Use SSH Port Forwarding to access the local open port 9001.
Stabilize with a SSH connection by generating a SSH key and put it into the apaar's user authorized_keys

Navigate to
http://chillhack.thm:9001/



This part can be skipped directly to SCP download of the necessary
hacker-with-laptop_23-2147985341.jpgfile.Enumerate MySQL with
root:!@m+her00+@db
Check the two password strings
Check them on https://crackstation.net/
π Login credentials are:
Aurick:masterpassword
cullapaar:dontaskdonttellLogin to the portal
http://chillhack.thm:9001/. The successful login redirect tohacker.phppage where there is a hacker with laptop.jpgfile that needs to be downloaded.

Download the hacker-with-laptop_23-2147985341.jpg file using scp
Check the image file with steghide
Crack Zip

Check the unzipped file

Decrypt the base64 hash
π
anurodh:!d0ntKn0wmYp@ssw0rd

anurodh is in the docker group. Spawn a root shell by using a docker command.
Check it from the GTFOBins - Docker list


Persistence (extra)

Last updated
Was this helpful?
