Dev

Enumeration

sudo netdiscover -r 10.0.2.0/24

 10.0.2.8        08:00:27:2d:08:71      2     120  PCS Systemtechnik GmbH               
  • nmap

PORT      STATE SERVICE  VERSION
22/tcp    open  ssh      OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 bd:96:ec:08:2f:b1:ea:06:ca:fc:46:8a:7e:8a:e3:55 (RSA)
|   256 56:32:3b:9f:48:2d:e0:7e:1b:df:20:f8:03:60:56:5e (ECDSA)
|_  256 95:dd:20:ee:6f:01:b6:e1:43:2e:3c:f4:38:03:5b:36 (ED25519)
80/tcp    open  http     Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Bolt - Installation error
111/tcp   open  rpcbind  2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100003  3           2049/udp   nfs
|   100003  3           2049/udp6  nfs
|   100003  3,4         2049/tcp   nfs
|   100003  3,4         2049/tcp6  nfs
|   100005  1,2,3      33059/udp   mountd
|   100005  1,2,3      45785/udp6  mountd
|   100005  1,2,3      49501/tcp   mountd
|   100005  1,2,3      51005/tcp6  mountd
|   100021  1,3,4      34697/tcp   nlockmgr
|   100021  1,3,4      35729/tcp6  nlockmgr
|   100021  1,3,4      51810/udp6  nlockmgr
|   100021  1,3,4      56408/udp   nlockmgr
|   100227  3           2049/tcp   nfs_acl
|   100227  3           2049/tcp6  nfs_acl
|   100227  3           2049/udp   nfs_acl
|_  100227  3           2049/udp6  nfs_acl
2049/tcp  open  nfs_acl  3 (RPC #100227)
8080/tcp  open  http     Apache httpd 2.4.38 ((Debian))
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported:CONNECTION
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: PHP 7.3.27-1~deb10u1 - phpinfo()
34697/tcp open  nlockmgr 1-4 (RPC #100021)
35899/tcp open  mountd   1-3 (RPC #100005)
49501/tcp open  mountd   1-3 (RPC #100005)
54403/tcp open  mountd   1-3 (RPC #100005)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.29 seconds

Apache

  • FFUF

  • browse through interesting folders and apps discovered

NFS

  • Mount

  • Unzip file found

  • Try cracking ZIP password

  • Unzip again with the password java101

BOLTWIRE

https://www.exploit-db.com/exploits/48411

URL

Need to register with a normal user first

This find with the id_rsa found before can be an indication

SSH

  • Since we have sudo without password we can look for sudo escalation using the ZIP command

Using GTFOBin

Last updated