Skip to main content

VulnNet: Internal

Enumeration
#

 nmap -sVC 10.10.45.251 -oA nmap           
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-02 16:50 +0545
Nmap scan report for 10.10.45.251 (10.10.45.251)
Host is up (0.17s latency).
Not shown: 993 closed tcp ports (reset)
PORT     STATE    SERVICE     VERSION
22/tcp   open     ssh         OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 5e:27:8f:48:ae:2f:f8:89:bb:89:13:e3:9a:fd:63:40 (RSA)
|   256 f4:fe:0b:e2:5c:88:b5:63:13:85:50:dd:d5:86:ab:bd (ECDSA)
|_  256 82:ea:48:85:f0:2a:23:7e:0e:a9:d9:14:0a:60:2f:ad (ED25519)
111/tcp  open     rpcbind     2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100003  3           2049/udp   nfs
|   100003  3           2049/udp6  nfs
|   100003  3,4         2049/tcp   nfs
|   100003  3,4         2049/tcp6  nfs
|   100005  1,2,3      36991/udp   mountd
|   100005  1,2,3      43419/tcp6  mountd
|   100005  1,2,3      48140/udp6  mountd
|   100005  1,2,3      56363/tcp   mountd
|   100021  1,3,4      37589/tcp6  nlockmgr
|   100021  1,3,4      38051/tcp   nlockmgr
|   100021  1,3,4      46207/udp   nlockmgr
|   100021  1,3,4      46756/udp6  nlockmgr
|   100227  3           2049/tcp   nfs_acl
|   100227  3           2049/tcp6  nfs_acl
|   100227  3           2049/udp   nfs_acl
|_  100227  3           2049/udp6  nfs_acl
139/tcp  open     netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp  open     netbios-ssn Samba smbd 4.7.6-Ubuntu (workgroup: WORKGROUP)
873/tcp  open     rsync       (protocol version 31)
2049/tcp open     nfs         3-4 (RPC #100003)
9090/tcp filtered zeus-admin
Service Info: Host: VULNNET-INTERNAL; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
|_nbstat: NetBIOS name: VULNNET-INTERNA, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.7.6-Ubuntu)
|   Computer name: vulnnet-internal
|   NetBIOS computer name: VULNNET-INTERNAL\x00
|   Domain name: \x00
|   FQDN: vulnnet-internal
|_  System time: 2025-03-02T12:05:49+01:00
| smb2-time: 
|   date: 2025-03-02T11:05:49
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
|_clock-skew: mean: -19m59s, deviation: 34m37s, median: 0s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.29 seconds

We can see nfs shares.

We can mount it to our by this. sudo mount -v -t nfs 10.10.45.251:/opt/conf mnt

We can also see this.

And this too.

Lots of services.

Lets enumerate all of them. And we can get service.txt.

And we can get these.
hmm.

Lets enumerate further. And we can find this in redis.conf file from that mount.

Now we can do this.
And doing keys all gave this.
And we got internal flag too.

Foothold
#

I was new to this services,so i took the help of chatGPT and we could do this.

And decoding this gave this.

echo "QXV0aG9yaXphdGlvbiBmb3IgcnN5bmM6Ly9yc3luYy1jb25uZWN0QDEyNy4wLjAuMSB3aXRoIHBhc3N3b3JkIEhjZzNIUDY3QFRXQEJjNzJ2Cg==" | base64 -d
Authorization for rsync://[email protected] with password Hcg3HP67@TW@Bc72v

Hmm we got another password. We can again do this. rsync [email protected]::files --password-file=<(echo -n 'Hcg3HP67@TW@Bc72v')

And we can see sys-internal. rsync [email protected]::files/sys-internal/ And files of home directory.

We can see .ssh directory. So lets try to grab a ssh private key. But its not there.

So lets try to add our public key there. After searching for commands,we could do this. rsync -av ./authorized_keys [email protected]::files/sys-internal/.ssh/

So we will gonna put our public key in a file authorized_keys and transfer it to the .ssh directory.

Hmm and we can find user by this. rsync [email protected]::files/sys-internal/../

Lets try to do ssh on sys-internal. And we were successful.

Privelege escalation
#

Lets do privelege escalation. Lets first run linpeas.sh here.

And we can see this TeamCity directory in /.

Lets enumerate. And we can see something in port 8111.

Lets do port forwarding by ssh and check. ssh -i user -L 8111:localhost:8111 [email protected]

Now lets check in our localhost.

Hmm but we needs creds. And logging as super user needs Authentication token. Hmm let try to find in that teampass directory. grep -r -i 'authorization\|token' .

And we found something.

Hmmm. Lets try it out. And we could login with this one.

Lets see what can we do.

Hmm.

Interesting. I guess we have to play around it for some time. We could do this.

So we made this.

Lets skip this.

And we were stuck again. After long time of search,we could edit build step and do like this.

Hmm lets select command line. lets save this.

Lets try to run it and hope it works. It worked but we forget gave setuid.

Lets try it again and give setuid this time. And we did it.

So we made a new project as administrator. And filled essential things. And when it comes to Build steps,we change it to use commands and inserted a command that can give us root. And got root.

Again learned so many things.

Done.
#

Done.

There are no articles to list here yet.