Home Sau Notes
Post
Cancel

Sau Notes

Sau Report


Information gathering


Scope: 10.10.11.224 (Linux)

  • Nmap scan:

Open ports:

22/ssh (Secure shell protocol):

  • Banner grabbing:
    • OpenSSH_8.2p1 Ubuntu-4ubuntu0.7

55555/uknown (http):

  • Banner grabbing:
    • Netcat:
      • 400 Bad Request
    • Whatweb:
    • Firefox:
  • Directory Enumeration
    • Curl:
    • Service version:
      • Vulnerable to SSRF (Server side request forgery):
        • Request basket API: https://rbaskets.in/api.html
        • Create baskets: test
        • Set forward URL and Proxy response option
        • Go to http://10.10.11.224:55555/test:

Vulnerability assessment


Scanning internal ports:

Exploitation


Foothold (puma user):

Post-exploitation


Sudo permissions without password on a commad: sudo /usr/bin/systemctl status trail.service:

  • With a interactive TTY:
    • Sudoers file:
      • The /etc/sudoers file is used to store all sudo privileges, such as which users are allowed to run sudo, which commands they are allowed to execute as sudo, which users they are allowed to impersonate and whether this will require a password to be entered.

Lateral movement


Proof of concept



This post is licensed under CC BY 4.0 by the author.