Internal
Last updated
Last updated
Running dirsearch on Port 80 shows we have some interesting directories.
the directory phpmyadmin shows no opportunity to login with the root account. Likely only localhost logins are permitted.
Looking back at the dirsearch results the directory /blog appears to be running wordpress as a subdirectrory was discovered of /blog/wp-admin/.
Further inspection of /blog/ shows we are indeed running Wordpress.
Running the following wpscan command shows we have a user called admin which is soon bruteforced using the rockyou.txt wordlist.
Heading over to http://internal.thm/blog/wp-admin/ we can then login with the credentials admin:my2boys
.
Heading over to Themes and then theme editor allows us to pick a page to edit. In this example I replaced the code in the 404.php file with that of a reverse shell.
At this point usually all we need to do is browse to the 404.php page to prompt for a call back on netcat.
This site is set up a bit different and after clicking around and following some links the directory structure for this site appears to be http://internal.thm/blog/index.php/.
I then browsed to http://internal.thm/blog/index.php/0000/0/ to try and get a 404.php page redirect which worked and I was able to get a shell on the system.
From here I found multiple potential credentials on the machine for databases and such. None of these lead me to any escalation until I stumbled upon the /opt/ directory which contains wp-save.txt
With the credentials of aubreanna:bubb13guM!@#123
we can switch to this user. Running cat on the jenkins.txt file reveals the following information:
From our attacking host we can run the following SSH command to portforward port 8080 over to us on 127.0.0.1.
We can then in a web browser head over to http://127.0.0.1:8080
I treid known credentials against this and was unsuccessful in logging in. Bruteforcing with ZAP shows a differential response size header on the payload spongebob.
Following the Groovy scipt code here change the cmd string to /bin/bash and the host to your attacking machine VPN interface IP.
https://gist.github.com/frohoff/fed1ffaab9b9beeb1c76
Checking our netcat
shell after confirms we are connected as the Jenkins service.
Again we have information in the /opt/ directory. This time regarding SSH credentials for the root account.
Which are confirmed working for a SSH connection.