Nmap Results →

Nmap scan report for 10.10.91.159                                                                                    
Host is up (0.046s latency).                                                                                         
Not shown: 65533 closed ports
9999/tcp  open  abyss?                                                                                               
| fingerprint-strings:                                                                                               
|   NULL:                                                                                                            
|     _| _|                                                                                                          
|     _|_|_| _| _|_| _|_|_| _|_|_| _|_|_| _|_|_| _|_|_|                                                              
|     _|_| _| _| _| _| _| _| _| _| _| _| _|                                                                          
|     _|_|_| _| _|_|_| _| _| _| _|_|_| _|_|_| _| _|                                                                  
|     [________________________ WELCOME TO BRAINPAN _________________________]                                       
|_    ENTER THE PASSWORD                                                                                             
10000/tcp open  http    SimpleHTTPServer 0.6 (Python 2.7.3)                                                          
|_http-server-header: SimpleHTTP/0.6 Python/2.7.3                                                                    
|_http-title: Site doesn't have a title (text/html).                                                                 
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at <https://nmap.org/cgi-bin/submit.cgi?new-service> :
SF-Port9999-TCP:V=7.80%I=7%D=7/18%Time=5F12C47C%P=x86_64-pc-linux-gnu%r(NU                                           
SF:LL,298,"_\\|\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20                                           
SF:\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20_\\|\\x20\\x20\\x20\\x20                                           
SF:\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x2                                           
SF:0\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x                                           
SF:20\\n_\\|_\\|_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x20_\\|_\\|\\x20\\x20\\x20\\x20_\\|_\\|_\\|                                           
SF:\\x20\\x20\\x20\\x20\\x20\\x20_\\|_\\|_\\|\\x20\\x20\\x20\\x20_\\|_\\|_\\|\\x20\\x20\\x20\\                                           
SF:x20\\x20\\x20_\\|_\\|_\\|\\x20\\x20_\\|_\\|_\\|\\x20\\x20\\n_\\|\\x20\\x20\\x20\\x20_\\|\\x                                           
SF:20\\x20_\\|_\\|\\x20\\x20\\x20\\x20\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x20_\\|\\x                                           
SF:20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x20_\\|\\x                                           
SF:20\\x20\\x20\\x20_\\|\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\n_\\|\\x20\\x20\\x20\\x20_\\|                                           
SF:\\x20\\x20_\\|\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x                                           
SF:20_\\|\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x                                           
SF:20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\n_\\|_\\|_\\|\\x20\\x                                           
SF:20\\x20\\x20_\\|\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20_\\|_\\|_\\|\\x20\\x20_                                           
SF:\\|\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\x20\\x20_\\|_\\|_\\|\\x20\\x20\\x20\\x20\\x20\\x                                           
SF:20_\\|_\\|_\\|\\x20\\x20_\\|\\x20\\x20\\x20\\x20_\\|\\n\\x20\\x20\\x20\\x20\\x20\\x20\\x20                                           
SF:\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x2

When we connect to the 9999 via telnet we get an application called brainpan open up for us and it tells us to enter our password

I sent it 5000 A's to see if the application crashes or handles it well but lucky for us it crashes.

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/24381ff1-7500-4178-8dd3-40bf34c10c2d/Untitled.png

Now lets go to the HTTP Server using ip:10000 and we see this page which doesnt have anything intresting so lets do a gobuster and see if we find something.

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/205ecb9a-9086-4446-b8df-f6ffa05456da/Untitled.png

gobuster dir -w=/usr/share/wordlists/dirb/common.txt -u <http://10.10.91.159:10000/>

and the first folder we find is bin

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/d8ba109e-240d-4002-9522-9b42f27b8ac3/Untitled.png

so lets traverse there and we find

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/5b2a78ec-3af7-41b0-9fc9-b720582de725/Untitled.png

sooo gg we found the binary lets export this and take it to our windows machine and exploit it and get the shell.

So now i have attached it to Immunity Debbuger and lets generate 5000 cyclic characters using msf-pattern_create and send it to this binary.