KIOPTRIX- Level 1.2 (#3)
- Layout for this exercise:
1 - INTRODUCTION
- The goal of this exercise is the study of the hacking process for the vulnerable machine Kioptrix Level 1.2 (#3)
- Kioptrix Level 1.2 (#3) can be downloaded from here:
https://www.vulnhub.com/entry/kioptrix-level-12-3,24/
- Once downloaded, extracted and opened with WMware:
2 - ENUMERATION
- First, using netdiscover let's notice that the only IP address in the local network working with WMware is 192.168.1.12, so it should correspond to the vulnerable machine Kioptrix:
- When downloading the vulnerable machine there is a text file README.txt:
- Following these directions let's modify /etc/hosts:
- Now, we can directly connect to the URL kioptrix3.com:
- Clicking the Login tab, it seems that the web application is using LotusCMS:
- Scanning for versions and the operating system with Nmap:
- dirb bruteforces directories and files on the web server:
- We learn that there is a phpMyAdmin portal:
3 - EXPLOITATION
3.1 - Searching for a exploit
- Googling vulnerabilities for LotusCMS:
- There is a script that can be used to exploit remotely the web application:
- Copying the script to the attacker's machine:
- Setting a listening netcat session on port 5555:
- Launching the exploit, and providing parameters like the attacker's IP (192.168.1.17) and the port 5555:
- Eventually a reverse shell is achieved, though limited with non-root privileges:
3.2 - Metasploit
- Using Metasploit we achieve the same result:
4 - PRIVILEGE ESCALATION
- Let's start our privilege escalation process.
- Going to the web root directory there is a gallery folder:
- Opening gallery we find a gconfig.php file:
- The file gconfig.php contains interesting credentials:
- Let's try these credentials to access the phpMyAdmin portal:
- The login is successful:
- Querying dev_accounts:
- We find two user accounts with their encrypted/hashed passwords:
- Using CrackStation to decrypt the hashes we get both plaintext passwords:
- Hydra can also decrypt the hashes:
- Going to the user loneferret home directory there is a .sudo_as_admin_successful:
- Also, reading the README text file we learn that the user loneferret could be related to the sudoers users:
- SSH-ing to the Kioptrix3 machine with the loneferret account:
- Option -l for sudo gives information about what commands can be used by the user:
- In this case we learn that the user loneferret has access to the HT Editor, a program able to edit executable files:
- Locating the HT Editor:
- When using ht there is a problem with the terminal, that can be easily solved:
- Now, the HT Editor window pops up and modifications can be performed to the files:
- F3 opens /etc/sudoers:
- Adding the privilege to run /bin/sh and saving the change:
- Now, loneferret is able to run sudo /bin/sh and a root shell is achieved:
5 - CAPTURING THE FLAG
- Finally, going to the /root folder: