Machine - Writer

  • nmap:
    • ports 22, 80, 139(smb), 445 (smb)
    • the web page seams pretty normal
  • fuzz
    • wfuzz -w /usr/share/dict/directory-list-2.3-medium.txt --hc 404 http://10.10.11.101/FUZZ
    • we found a couple of interesting urls
000000269:   301        9 L      28 W       313 Ch      "static"
000001225:   302        3 L      24 W       208 Ch      "logout"
000002927:   302        3 L      24 W       208 Ch      "dashboard"
000015237:   200        34 L     99 W       1443 Ch     "administrative"
  • in administrative there is a login panel, but we have no credentials
    • Could try to use hydra… with the user admin…
    • sudo hydra -l admin -P /usr/share/dict/rockyou.txt 10.10.11.101 http-post-form "/administrative:uname=admin&password=^PASS^:Incorrect"
  • Try enumerate users on smb as well
> smbmap.py -H 10.10.11.101
[+] IP: 10.10.11.101:445        Name: 10.10.11.101
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        print$                                                  NO ACCESS       Printer Drivers
        writer2_project                                         NO ACCESS
        IPC$                                                    NO ACCESS       IPC Service (writer server (Samba, Ubuntu))
  • is using smbd 4.6.2
  • seems that there an exploit for it eternal red in metasploit
  • nothing… we need a writable smb shared
  • let’s try sql injection
    • wioth burp we get the request into a file
    • sqlmap -r $(pwd)/request
  • Abandon! :(

Machine - Driver Machine - Horizontall