Hackthebox - Frolic
Contents
From nmap, there are several services opened.
This is the web page.
There is nothing in the smb server.
From gobuster, I found a directory backup
containing credentials.
And there is a admin
page.
It includes login.js
, and it contains another credential.
After we login, there is something called Ook! language
. I use the online decoder to decode it and get a directory name.
In this directory, there is a base64 string. I decode it and get a zip file.
There is a passphrase for this zip file. I use john to crack it, and get the password password
.
There is a index.php
, I convert it from hexdump into binary, base64 decode, and brainfuck interpret, get a string at the end.
There is another directory dev
, and it indicates /playsms
.
There is a login page. I login with admin
and what I got from brainfuck.
There is a vulnerability for playsms. Use one of the module in msf, we can get a shell as www-data
.
There is a strange binary rop
with SUID bit.
I use ghidra to decompile it, and there is a buffer overflow vulnerability.
Determine how many bytes we need to trigger the vulnerability.
Doing checksec.
Try to find some useful gadgets in its libc.
I create a python script to make the payload, and pass it as the parameter to rop
. Now, I am root.
Author L3o
LastMod 2020-05-31