Academy
Hack The Box - Academy
This is my writeup and walkthrough for Academy machine from Hack The Box.
Enumeration
1-Nmap
nmap -sC -sV 10.10.10.215
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-17 19:55 EET
Nmap scan report for academy.htb (10.10.10.215)
Host is up (0.37s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Hack The Box Academy
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
checking http service
adding 10.10.10.194 to our /etc/hosts file
first i tried to exploit login page may i find sql injection but i failed ,second i used dirsearch tool to brute force directories.
I opened the admin.php
page and found it was a login page
So I created an account and tried to login from admin.php
but failed.
this is the request format during registration
i tried to change the value of the roleid
to 1 and login again this time i can login successfully
i added this subdomain to /etc/hosts
and opened it
I noticed that site based on laravel
framework and i have app_key
so i searched exploits and i found that PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Command
this module available in metasploit
okey lets exploit we need to set
1-app_key "dBLUaMuZz7Iq06XtL/Xnz/90Ejq+DEEynggqubHWFj0="
2-lhost
3-rhost
4-vhost (virtual host) for subdomain
5-local machine port
2- user access
In fact, it was not difficult to obtain the powers of the user.
I just reviewed the env file and found file with data base and the cry0l1t3
password.
Just need some time to search.
3-root access
now i can login with ssh
i upgraded to tty shell python3 -c 'import pty; pty.spawn("/bin/bash")'
or to upgrade to full tty shell use this commands
/usr/bin/script -qc /bin/bash /dev/null
Ctrl-Z
stty raw -echo
fg
Ctrl-Z
i found that adm
group,
To be honest, I did not know at first what it was, but I searched for it and knew the difference between it and the admin
group
by adm previlige i could check process happen in the server is checked all logs i had access on them,
so i checked audit
logs
its very big logs so i should find way to search logs easly
cat audit.log.3 |grep "uid=1002"
this process for server user tried to use su
command this data after hexadecimal decode mrb3n_Ac@d3my!
I think it’s clear it’s to mrb3n
i could take mrb3n
previlige
by lookng at user privileges sudo -l
this user can run coomand from composer
composer
Composer is a tool for dependency management in PHP.
It allows you to declare the libraries your project depends on and it will manage (install/update) them for you.