Bulletproof Penguin
Bulletproof Penguin
Redis Server No Password
1
2
3
4
5
6
7
8
9
thm@ip-10-10-131-119:~$ ss -ltnp|grep 0.0.0.0
LISTEN 0 4096 127.0.0.53%lo:53 0.0.0.0:*
LISTEN 0 128 0.0.0.0:22 0.0.0.0:*
LISTEN 0 128 0.0.0.0:23 0.0.0.0:*
LISTEN 0 511 0.0.0.0:8000 0.0.0.0:*
LISTEN 0 4096 127.0.0.1:39713 0.0.0.0:*
LISTEN 0 70 127.0.0.1:33060 0.0.0.0:*
LISTEN 0 151 0.0.0.0:3306 0.0.0.0:*
LISTEN 0 511 0.0.0.0:6379 0.0.0.0:*
Patch redis config
1
2
3
4
5
cat > /etc/redis/redis.conf <<EOF
requirepass "bravosec1337"
bind 127.0.0.1
protect-mode yes
EOF
1
2
3
root@ip-10-10-131-119:/home/thm# systemctl list-units --type service|grep redis
redis-server.service loaded deactivating stop-sigterm restart Advanced key-value store
root@ip-10-10-131-119:/home/thm# systemctl restart redis-server.service
Report Default Community Names of the SNMP Agent
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(bravosec㉿fsociety)-[~/thm/Bulletproof Penguin]
└─$ snmp-check $(pt get rhost) | tee snmp-check.txt
snmp-check v1.9 - SNMP enumerator
Copyright (c) 2005-2015 by Matteo Cantoni (www.nothink.org)
[+] Try to connect to 10.10.131.119:161 using SNMPv1 and community 'public'
[*] System information:
Host IP address : 10.10.131.119
Hostname : ip-10-10-131-119
Description : Linux ip-10-10-131-119 5.15.0-1044-aws #49~20.04.1-Ubuntu SMP Mon Aug 21 17:09:32 UTC 2023 x86_64
Contact : Me <me@example.org>
Location : Sitting on the Dock of the Bay
Uptime snmp : 00:27:42.30
Uptime system : 00:27:30.74
System date : 2023-10-30 18:05:14.0
Change community name
Search for public
and change to private string
1
vi /etc/snmp/snmpd.conf
1
2
3
root@ip-10-10-131-119:/home/thm# systemctl list-units|grep snmp
snmpd.service loaded active running Simple Network Management Protocol (SNMP) Daemon.
root@ip-10-10-131-119:/home/thm# systemctl restart snmpd
Nginx running as root
1
2
3
4
5
root@ip-10-10-131-119:/home/thm# ps auxfw|grep nginx|grep root
root 656 0.0 0.1 51216 1448 ? Ss 17:37 0:00 nginx: master process /usr/sbin/nginx -g daemon on; master_process on;
root 661 0.0 0.4 51916 4628 ? S 17:37 0:00 \_ nginx: worker process
root 665 0.0 0.3 51780 3448 ? S 17:37 0:00 \_ nginx: worker process
root 2177 0.0 0.0 8168 720 pts/0 S+ 18:13 0:00 \_ grep --color=auto nginx
Change user to www-data
1
2
sed -i.bak 's/user root;/user www-data;/g' /etc/nginx/nginx.conf
systemctl restart nginx
Cleartext Protocols
1
2
root@ip-10-10-131-119:/home/thm# ss -ltnp|grep :23
LISTEN 0 128 0.0.0.0:23 0.0.0.0:* users:(("inetd",pid=487,fd=7))
Disable telnet
1
2
systemctl disable inetd
systemctl disable inetd
Weak SSH Crypto
Patch ssh config
Recover ssh’s default config
1
2
3
mv /etc/ssh/sshd_config /etc/ssh/sshd_config~
cp /usr/share/openssh/sshd_config /etc/ssh/sshd_config
systemctl restart ssh.service
Anonymous FTP Login Reporting
Disable ftp anonymous login
1
sed -i.bak '/^ftp/d' /etc/passwd
Weak Passwords
Unused accounts
1
2
userdel -rf joseph
userdel -rf test1
Bulk change users’ password
1
2
3
┌──(bravosec㉿fsociety)-[~/thm/Bulletproof Penguin]
└─$ openssl passwd -6 -salt xyz bravosec1337
$6$xyz$AWIVzlZPM3bGYMMs83tjb7v/DE2N7447Ee9OQw4PiNcNAZn3qhkXsJuha87Aw7WVGq3hvBfvZ913wbWP2s1Sy0
1
for USER in $(cat /etc/passwd|grep sh$|cut -d":" -f1|xargs); do /usr/sbin/usermod -p '$6$xyz$AWIVzlZPM3bGYMMs83tjb7v/DE2N7447Ee9OQw4PiNcNAZn3qhkXsJuha87Aw7WVGq3hvBfvZ913wbWP2s1Sy0' $USER; done
Review Sudo Permissions
Patch sudoers config file
1
vi /etc/sudoers
ALL=(ALL:ALL) ALL
NOPASSWD
The user
mary
must be able to run the/usr/bin/ss
command as root. When doing so, she must NOT be asked for her password. Assign the corresponding sudo privileges.
1
mary ALL=(root) NOPASSWD : /usr/bin/ss
Exposed Database Ports
1
2
3
4
5
6
7
8
9
10
11
root@ip-10-10-131-119:/home/thm# ss -ltunp|grep 0.0.0.0
udp UNCONN 0 0 127.0.0.53%lo:53 0.0.0.0:* users:(("systemd-resolve",pid=412,fd=12))
udp UNCONN 0 0 10.10.131.119%ens5:68 0.0.0.0:* users:(("systemd-network",pid=409,fd=15))
udp UNCONN 0 0 0.0.0.0:161 0.0.0.0:* users:(("snmpd",pid=2190,fd=6))
tcp LISTEN 0 4096 127.0.0.53%lo:53 0.0.0.0:* users:(("systemd-resolve",pid=412,fd=13))
tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=3769,fd=3))
tcp LISTEN 0 511 0.0.0.0:8000 0.0.0.0:* users:(("nginx",pid=2234,fd=6),("nginx",pid=2233,fd=6),("nginx",pid=2232,fd=6))
tcp LISTEN 0 4096 127.0.0.1:39713 0.0.0.0:* users:(("containerd",pid=522,fd=14))
tcp LISTEN 0 70 127.0.0.1:33060 0.0.0.0:* users:(("mysqld",pid=892,fd=21))
tcp LISTEN 0 151 0.0.0.0:3306 0.0.0.0:* users:(("mysqld",pid=892,fd=23))
tcp LISTEN 0 511 0.0.0.0:6379 0.0.0.0:* users:(("redis-server",pid=770,fd=6))
Bind mysql to localhost only
1
2
sed -i.bak 's/bind-address.*/bind-address = 127.0.0.1/I' /etc/mysql/mysql.conf.d/mysqld.cnf
systemctl restart mysql
Get flags
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
root@ip-10-10-131-119:/home/thm# get-flags
{
"ssh_weak_ciphers": "THM{9ff9c182cad601291d45951c01d0b2c7}",
"ssh_weak_kex": "THM{d9baf598ee934d79346f425a81bd693a}",
"ssh_weak_macs": "THM{e3d6b82f291b64f95213583dcd89b659}",
"redis_nopass": "THM{ae4e5bb7aac2c2252363ca466f10ffd0}",
"redis_port_public": "THM{20a809866dbcf94109189c5bafabc5c2}",
"mysql_port_public": "THM{526e33142b54e13bb47b17056823ab60}",
"snmp_public": "THM{aa397a808d527fd71f023c78d3c04591}",
"nginx_asroot": "THM{bebb02b22bb56b2f79ba706975714ee2}",
"unused_accounts": "THM{1b354db0e71f75057abe69de26a637ab}",
"change_pass": "THM{be74a521c3982298d2e9b0e347a3807d}",
"sudoers_mary": "THM{a0bcb9b72fd26d0ad55cdcdcd21698f1}",
"sudoers_munra": "THM{1e9ee13fb42fea2a9eb2730c51448241}",
"cleartext_services": "THM{33704d74ec53c8cf50daf817bea836a1}",
"anon_ftp": "THM{f20b5ff5a3d4c779e99c3a93d1f68c6d}"
}
This post is licensed under CC BY 4.0 by the author.