Peppo
Gaining Access
Nmap scan:
$ nmap -p- --min-rate 3000 -Pn 192.168.201.60
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-15 11:59 +08
Nmap scan report for 192.168.201.60
Host is up (0.17s latency).
Not shown: 65529 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
113/tcp open ident
5432/tcp open postgresql
8080/tcp open http-proxy
10000/tcp open snet-sensor-mgmtPort 113 was something new.
Ident -> SSH
I wanted to enumerate the Ident instance running on port 113 first. We can run ident-user-enum to check which users are present:
$ ident-user-enum 192.168.201.60 22 113 5432 8080 10000
ident-user-enum v1.0 ( http://pentestmonkey.net/tools/ident-user-enum )
192.168.201.60:22 root
192.168.201.60:113 nobody
192.168.201.60:5432 <unknown>
192.168.201.60:8080 <unknown>
192.168.201.60:10000 eleanoreleanor was one of the users. I just tried some weak credentials, and it turns out eleanor was the SSH password.

Privilege Escalation
Shell Escape
id doesn't work for some reason, so we can check our $PATH variable:
We cannot change the $PATH environment variable:
However, we can use ed to spawn a better shell and change this.

Docker Group -> Root
The user is part of the docker group, which means we can easily get root. First check the images present:
I'll use redmine for the exploit to spawn a root shell:

Last updated