Post

DERPNSTINK 1

Description ⤵️

💡 DIFFICULTY → DerpNStink

Beginner

DESCRIPTION →

Mr. Derp and Uncle Stinky are two system administrators who are starting their own company, DerpNStink. Instead of hiring qualified professionals to build up their IT landscape, they decided to hack together their own system which is almost ready to go live…

INSTRUCTIONS →

This is a boot2root Ubuntu based virtual machine. It was tested on VMware Fusion and VMware Workstation12 using DHCP settings for its network interface. It was designed to model some of the earlier machines I encountered during my OSCP labs also with a few minor curve-balls but nothing too fancy. Stick to your classic hacking methodology and enumerate all the things!

Your goal is to remotely attack the VM and

find all 4 flags eventually leading you to full root access.

Do not forget to #tryharder

Example: flag1(AB0BFD73DAAEC7912DCDCA1BA0BA3D05). Do not waste time decrypting the hash in the flag as it has no value in the challenge other than an identifier.

CONTACT →

Hit me up if you enjoy this VM! Twitter: @securekomodo Email: hackerbryan@protonmail.com

Let’s find the IP Address first »

Untitled

1
IP : 10.0.2.14

Port Scan Results ➡️

Untitled

Untitled

1
2
3
4
OPEN PORTS >
21   FTP (Check for Anonymous Login)
22   SSH (Not seams vulnerable)
80   HTTP (Time to dig into this !)

Web Enumeration ⤵️

I checked the port 80 :

Untitled

set the /etc/hosts as 10.0.2.14 derpnstink.local

Untitled

Lets use wpscan results →

Untitled

Untitled

Then lets find the username and password →

Untitled

Now lets login and upload the image which consist of a payload →

Untitled

Through enumeration I got this →

Untitled

1
Flag 1 →  flag1(52E37291AEDF6A46D7D0BB8A6312F4F9F1AA4975C248C3F0E008CBA09D6E9166)

Untitled

It time to upload our payload →

Untitled

Finally got the reverse shell →

Untitled

As I got a Local Privilege Escalation →

Untitled

lets see this one →

Untitled

Untitled

Lets check the database now →

Untitled

Untitled

1
unclestinky

Untitled

Lets identify the hash →

Untitled

This result is from hashes.com

Untitled

1
unclestinky → wedgie57

Now lets try su stinky again →

Untitled

Untitled

1
Flag 3 → flag3(07f62b021771d3cf67e2e1faf18769cc5e5c119ad7d4d1847a11e11d6d5a7ecb)

Untitled

Let is import this pcap file to attackers machine →

Untitled

1
mrderp → derpderpderpderpderpderpderp

Untitled

Now I have created a file name derpy.sh →

**echo** "**/**bin**/bash"** > derpy.sh

Untitled

Untitled

1
Flag 4 → flag4(49dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd)

After login in wordpress with unclestinky credentials I able to got this at last →

Untitled

1
Flag 2 → flag2(a7d355b26bda6bf1196ccffead0b2cf2b81f0a9de5b4876b44407f1dc07e51e6)


Summery Notes →

  • This machine was very good , I enjoed the password extraction part from mysql server and decrypting the hash of it and getting the password of stinky was Awesome.
  • Then Extracting another password from pcap file of user mrderpy like old sake . But it was lengthy through.
  • Then lastly got the root and all the flags too.
  • Very Good machine (Teaches you many things)

If you have any questions or suggestions, please leave a comment below. Thank You !

This post is licensed under CC BY 4.0 by the author.