Enumeration
Port Scanning
TCP
# Nmap 7.92 scan initiated Fri Dec 10 01:33:54 2021 as: nmap -sC -sS -sV -oN nmap_full.txt -vvv -p- shibboleth.htb
Nmap scan report for shibboleth.htb (10.10.11.124)
Host is up, received echo-reply ttl 63 (0.051s latency).
Scanned at 2021-12-10 01:33:55 EST for 77s
Not shown: 65534 closed tcp ports (reset)
PORT STATE SERVICE REASON VERSION
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.41
| http-methods:
|_ Supported Methods: GET POST OPTIONS HEAD
|_http-title: FlexStart Bootstrap Template - Index
|_http-favicon: Unknown favicon MD5: FED84E16B6CCFE88EE7FFAAE5DFEFD34
|_http-server-header: Apache/2.4.41 (Ubuntu)
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Dec 10 01:35:12 2021 -- 1 IP address (1 host up) scanned in 78.00 seconds
UDP
# Nmap 7.92 scan initiated Fri Dec 10 06:57:55 2021 as: nmap -sU -vvv -oN nmap_udp_full.txt --min-rate=2000/5000/10000 --open shibboleth.htb
Nmap scan report for shibboleth.htb (10.10.11.124)
Host is up, received echo-reply ttl 63 (0.048s latency).
Scanned at 2021-12-10 06:57:55 EST for 2s
Not shown: 7 closed udp ports (port-unreach)
PORT STATE SERVICE REASON
2/udp open|filtered compressnet no-response
3/udp open|filtered compressnet no-response
------ snipped ------
623/udp open asf-rmcp udp-response ttl 63
623 UDP port 🤔, what could asf-rmcp be?
Found some procedure guidelines in book.hacktricks.xyz
Exploring UDP service
I shall enumerate the version using msfconsole.
So the service version is 2.0 and let’s use metasploit’s exploit for version 2.0 to retrieve the password hash as per the article
Cracked the hash
Administrator:ilovepumkinpie1
Web Enumeration
Subdomain Enumeration
ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -u "http://shibboleth.htb/" -H "Host:FUZZ.shibboleth.htb" --fw 18
Found 3 sub-domains
- monitor
- monitoring
- zabbix
Directory Search
feroxbuster -u http://shibboleth.htb/ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories-lowercase.txt
No interesting directory found.
Enumerating Zabbix
I found a interesting scripts for enumerating Zabbix in GitHub
Detecting version
I found a script for enumerating Zabbix version. And it detected it as 5.0
Foothold
Let’s break into Zabbix to gain a our foothold.
Logged in with the creds found from the UDP service
Zanbbix 5.0.17 is the version which is running
Go to configuration > hosts > items > create item
I wrote the payload for reverse shell in key.
I got a shell then lets su to ipmi-svc with the password we have.
Got user
Privilege Escalation
Open Ports
Linpeas
Found Nothing interesting
Manual Enumeration
Found password for mysql db
grep -iR "password" /etc/ 2>/dev/null | uniq | sort
MYSQL DB CREDS
zabbix:bloooarskybluh
Command Injection - MARIADB
CVE-2021-27928 exploit can be found in this repo
Rooted the machine