En-pass Writeup (TryHackMe)
Type: Pentesting
Difficulty: Medium
Prompt: https://tryhackme.com/room/En-pass
Solution
STEP_1 ==> NMAP SCAN
here we get a ssh and a http server.
STEP_2 ==> GOBUSTER
starting with gobuster on sever.
now finding more in web directory
by looking more we get this directory ==> /web/resources/infoseek/configure/key on this directory we get a ENCRYPTED ssh key.
STEP_3 ==> OPEN OTHER DIRECTORY
1 ==> reg.php
here we get a source code. as here we can make many password that only consist of symbol and satisfyting these condition
strlen($val[0]) == 2) and (strlen($val[8]) == 3 )
$val[5] !=$val[8] and $val[3]!=$val[7]
so take input ==> {@@,@@,@@,@@@,@@,@@,@@,@@@,@@@} and we get password ==> {cimihan_are_you_here?}
2 ==> ./zip
here, we get nothing except files named sadman which furter will of no use
3 ==> 403.php
we get this directory by taking hint from the box. here we open website and , now we have to bypass 403 error.
by using ==> https://github.com/intrudir/403fuzzer
command ==> python3 403fuzzer.py -u http://10.10.87.98:8001/403.php -hc 403,404,400 -p http://localhost:8080/
checking response from burp.
here we get username => {imsau}
STEP_4 ==> DECRYPTYING SSH KEY
here we decrypt sshkey by using this command and password we get in step3. command ==> openssl rsa -in key -out id_rsa
STEP_5 ==> USER.TXT
OPEN SSH SHELL –> stabalising shell by command => /usr/bin/script -qc /bin/bash /dev/null getting user.txt
STEP_6 ==> ROOT.TXT
here we get a file in this path this is crontab so we have to apply same conditions as follows for privilage escalation