Peppo

Gaining Access

Nmap scan:

$ nmap -p- --min-rate 3000 -Pn 192.168.201.60 
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-15 11:59 +08
Nmap scan report for 192.168.201.60
Host is up (0.17s latency).
Not shown: 65529 filtered tcp ports (no-response)
PORT      STATE  SERVICE
22/tcp    open   ssh
113/tcp   open   ident
5432/tcp  open   postgresql
8080/tcp  open   http-proxy
10000/tcp open   snet-sensor-mgmt

Port 113 was something new.

Ident -> SSH

I wanted to enumerate the Ident instance running on port 113 first. We can run ident-user-enum to check which users are present:

$ ident-user-enum 192.168.201.60 22 113 5432 8080 10000
ident-user-enum v1.0 ( http://pentestmonkey.net/tools/ident-user-enum )

192.168.201.60:22       root
192.168.201.60:113      nobody
192.168.201.60:5432     <unknown>
192.168.201.60:8080     <unknown>
192.168.201.60:10000    eleanor

eleanor was one of the users. I just tried some weak credentials, and it turns out eleanor was the SSH password.

Privilege Escalation

Shell Escape

id doesn't work for some reason, so we can check our $PATH variable:

We cannot change the $PATH environment variable:

However, we can use ed to spawn a better shell and change this.

Docker Group -> Root

The user is part of the docker group, which means we can easily get root. First check the images present:

I'll use redmine for the exploit to spawn a root shell:

Last updated