Bank

Overview

Initial Foothold : File upload on webserver and execute

Privilege Escalation : Permissions of /etc/passwd file

Enumeration

Starting with port scanning

Lets Start with port 80

Web Enumeration

Visit the webpage

Apache2 Default page was there

Add bank.htb into host file to see the webcontent

Now visit bank.htb

Got Default login page

we don't have any creds so we cannot login into this

Lets enumerate directories using dirbuster

Start the scan

Got some result support.php looks interesting.

Open that webpage but from the response code we can observe that it is redirecting to another webpage

Use brupsuite to intercept the request

Got the webpage but when forwarding it redirects to login page

Change the 302 Found to 200 code

and now forward the request

Got the Support.php webpage

Check the source code of the webpage

There is a comment which tells us to use .htb instead of .php while uploading files

Exploitation

Uploading file is allowed on the webserver by using .htb extension

Upload reverse php code to confirm that we can upload and execute files

Use pentestmonkey php reverse shell payload

change lhost and lport in the code and change the extension to .htb and upload the file on the webserver

Payload was successfully uploaded now access this through upload folder and the name of the payload

Setup Listener for shell

Got the shell as www-data user

Privilege Escalation

After some enumeration got that user has permission to write /etc/passwd file

This means if we will add our user with root permission in this file we will get root access to the machine

Copy the content of /etc/passwd to our localhost

Now create the user password hash using openssl

Now add this to passwd file that we copied from victim host

circle-info

Format should be same as specified above

Now transfer this file to victim machine and replace this with /etc/passwd file

now change user to yo and enter password pass123

Got the root access

That's all for this box

Good Bye :)

Last updated