- Layout for this exercise:

1 - INTRODUCTION
- The goal of this exercise is the study of the hacking process for the vulnerable machine Fristileaks 1.3:

- Fristileaks 1.3 can be downloaded from here:
https://www.vulnhub.com/entry/fristileaks-13,133/
- Once downloaded and extracted with VirtualBox:

2 - ENUMERATION
- Using netdiscover to confirm the presence of host 192.168.1.9 that corresponds to the vulnerable machine Fristileaks 1.3:


- Scanning with Nmap:

- Connecting with the browser to the only open port 80:

- Launching nikto to the host we find three folders inside robots.txt:


- Looking at robots.txt:

- Either connecting to /cola, /sisi or /beer the result is the same:

- Following the advice: "KEEP CALM AND DRINK FRISTI" ... let's try fristi:

3 - EXPLOITATION
- Viewing the source of the web page it seems that there is a user called eezeepz:

- After the image reference there is a text encoded into Base64 format:

- Decoding the text:

- The output is an image that could be a password:


- Using that series of letters as password for the user eezeepz:

- The login is successful, and we are invited to upload a file:


- Let's try a webshell, for instance this provided by Kali:

- Copying into a working directory to keep untouched the original version:

- The webshell must be modified to adapt to our needs:



- Now, it's time to upload the PHP file:


- However the upload fails because an image format (png,jpg,gif) is required:

- To bypass this problem let's rename the PHP webshell just adding a png extension:

- The new file is uploaded successfully:


- Now, starting a netcat listening session:

- Running the PHP reverse shell including it through the URL:

- The PHP reverse shell script is successful, achieving a limited shell:

4 - PRIVILEGE ESCALATION
- Browsing the /home directory, we detect 3 users:

- Access is denied to both /admin and /fristigod home folders:


- However there is access to /eezeepz:

- Listing the content of the home directory /eezeepz:

- Reading notes.txt:

- Giving access permisions to the folder /home/admin:

- Waiting for a minute, and accessing to /tmp/runthis:

- Now, access to /home/admin is granted:


- There are 2 text files whose contents seem encrypted text:


- Also there is a Python script self explanatory about how to decrypt the texts:

- Reversing the encrypting process we find 2 plaintext outputs with this Python script:
a) decoding with rot13
b) reversing the order
c) decoding with base64


- Now, trying to use su with fristigod we find that a new terminal is needed:

- Importing a new bash:

- su is successful for fristigod:

- Listing sudo powers for fristigod:

- Going to /var/fristigod it seems that the user fristi is able to run some interesting commands for administration purposes:

- Reading .bash_history gives us interesting information about how to use doCom:

- Opening .secret_admin_stuff we find doCom:

- Running ./doCom we need to provide a command:

- Trying /bin/bash eventually we achieve a root shell:

5 - CAPTURING THE FLAG
- Going to the /root folder:

