A couple of weeks ago, work sent me to a security class for an upcoming product. While there, I learned about vulnhub, a repository of intentionally vulnerable virtual machines for anyone to compromise. Since coming back, vulnhub has become my new obsession. Here’s a walkthrough of my attempt.
Note: I struggled a bit more that this writeup lets on. The struggle is ommited for clarity and brevity.
After finding the VM with an nmap scan, we see a couple of open ports.
Upon browsing to the web page, we’re greeted with our good friend, the troll.
With the CTFs I’ve done so far, I’ve run
uniscan, to find useful information about the site.
There’s almost always a
robots.txt file. Let’s start there.
OK, so another troll face. Uniscan and Nikto brought up nothing either. I guess it’s off to the FTP service then.
nmap -A against the FTP port and see that I get a name and version number. Searchsploit doesn’t turn
up anything useful so I try to log in as an anonymous user and bingo; next clue.
Let’s take a look at what’s inside (superfluous
grep added for display purposes)
So we get the string ‘sup3rs3cr3tdirlol’. Navigating there gets a directory listing with one file. Let’s download it.
$> curl -L 192.168.110.103/sup3rs3cr3tdirlol/roflmao
$> file roflmao
# shows it's a binary file
$> strings roflmao
# Find address 0x0856BF to proceed
During CTFs I usually append unique words I run into to a dictionary so I can either use them for brute force
attacks or for enumerating web directories with a tool like
dirbuster. It wasn’t very long at this point
and given the trolling nature of this challenge so far I thought maybe I should take our string’s words
literally. That, and it wasn’t a real memory address at only 3 bytes long.
Awesome! I downloaded the files which had what looked like usernames and a single password. One folder was called ‘this_folder_contains_the_password’. Again, taking things literally, I made a quick and dirty script to take all the words in this folder and append them to my wordlist.
url = 'http://192.168.110.103/0x0856BF/this_folder_contains_the_password'
data = open(url).read
page = Nokogiri::HTML(data)
def print_tree(node, list = )
return list if node.children.empty?
node.children.inject(list) do |memo, child|
text = child.text.split(" ").map(&:strip) unless child.text.nil?
memo.push(*text) if text
ruby scrape.rb >> word.list
This seemed like a good time to attack the ssh port with
hydra and our new lists. After a couple of
attempts, the SSH port stopped letting me try to authenticate. I went through the attack again, reversing the
user list, password list, then both, waiting for the ssh port to reset between attempts. And then…
Once we’re logged in, we’re immediately kicked off and we see the following message:
OK, after a few more logons, I notice it happens every 5 minutes… cron job.
In the meantime, I uploaded an enumeration script to
/tmp, but notice that it also gets deleted about every
2 minutes. Another cron job?
I tried to manually see if there were any SUID binaries to exploit or any world-writable files
find / --perm 6000
find / --perm 0777
There are! It’s a long list but 1 stands out:
/lib/log/cleaner.py The contents of the file looks
like it wipes the
/tmp directory. This must be the file that
Thank goodness it’s writable ;) I I start a meterpreter listener and replace the
cleaner.py contents with a
Since the owner of the
cleaner.py file was root, and the meterpreter stager was now the contents of the
Now we can take a look at the cron jobs to see what was trolling us and also at the flag
There we have it! This was so fun! CTF VMs have completely replaced video games for me.
2016-10-20 20:57 -0400