Nmap Results →

Nmap scan report for 10.10.173.26
Host is up (0.050s latency).
Not shown: 65532 closed ports
PORT   STATE SERVICE VERSION                                                                                                                                                                                                               
21/tcp open  ftp     vsftpd 3.0.2                                                                                                                                                                                                          
22/tcp open  ssh     OpenSSH 6.7p1 Debian 5 (protocol 2.0)                                                                                                                                                                                 
| ssh-hostkey:                                                                                                                                                                                                                             
|   1024 a0:8b:6b:78:09:39:03:32:ea:52:4c:20:3e:82:ad:60 (DSA)                                                                                                                                                                             
|   2048 df:25:d0:47:1f:37:d9:18:81:87:38:76:30:92:65:1f (RSA)                                                                                                                                                                             
|   256 be:9f:4f:01:4a:44:c8:ad:f5:03:cb:00:ac:8f:49:44 (ECDSA)                                                                                                                                                                            
|_  256 db:b1:c1:b9:cd:8c:9d:60:4f:f1:98:e2:99:fe:08:03 (ED25519)                                                                                                                                                                          
80/tcp open  http    Apache httpd 2.4.10 ((Debian))                                                                                                                                                                                        
|_http-server-header: Apache/2.4.10 (Debian)                                                                                                                                                                                               
|_http-title: Apache2 Debian Default Page: It works                                                                                                                                                                                        
No exact OS matches for host (If you know what OS is running on it, see <https://nmap.org/submit/> ).                                                                                                                                        
TCP/IP fingerprint:
OS:SCAN(V=7.80%E=4%D=7/11%OT=21%CT=1%CU=39816%PV=Y%DS=2%DC=T%G=Y%TM=5F0A110
OS:F%P=x86_64-pc-linux-gnu)SEQ(SP=FE%GCD=1%ISR=10F%TI=Z%CI=I%II=I%TS=8)OPS(
OS:O1=M508ST11NW7%O2=M508ST11NW7%O3=M508NNT11NW7%O4=M508ST11NW7%O5=M508ST11
OS:NW7%O6=M508ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%W5=68DF%W6=68DF)ECN(
OS:R=Y%DF=Y%T=40%W=6903%O=M508NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS
OS:%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=
OS:Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=
OS:R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T
OS:=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=
OS:S)

HTTP

So when we first traverse to the page we find out there is nothing intresting and its just a default page.

Lets try some dirbusting and see if we can get some directories that can be intresting and here the only abnormal one is /assets maybe there are some files on there or something.

===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url:            <http://10.10.173.26>
[+] Threads:        10
[+] Wordlist:       /usr/share/wordlists/dirb/common.txt
[+] Status codes:   200,204,301,302,307,401,403
[+] User Agent:     gobuster/3.0.1
[+] Timeout:        10s
===============================================================
2020/07/11 15:24:26 Starting gobuster
===============================================================
/.hta (Status: 403)
/.htpasswd (Status: 403)
/assets (Status: 301)
/.htaccess (Status: 403)
/index.html (Status: 200)
/server-status (Status: 403)

In the assets folder we find two files the styles.css and Rickrolled

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/2bc55da2-e9d6-4391-bfec-8de38044787a/Untitled.png

When we look at style.css we find this intresting comment there

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/4fc7404d-971c-4ca0-b781-cbfb6d5aaa4f/Untitled.png

which if we traverse we get a pop up which says turn of your javascript and then we get rickrolled.

Which i kinda found intresting and as its my only lead i tryed investigating it more by using Burp and intrecpting that request and that was it we find another hidden directory

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/462367b1-3310-4350-a04a-7e8f29fae0ce/Untitled.png

and when you go to this directory by doing <ip>/directoryname we get an image there

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/747f6456-d236-4d62-b38b-5de5348b0466/Untitled.png

If you run strings on that png file we find the user name and a list of possible passwords

So i copied all those possible passwords pasted them in a passlist file and then i used xhydra to brute force it you can use hydra if you want with the following command →

hydra -l username -P passlist -t 28 <ip> ftp

and then with the found credentials lets log in to the FTP server and then we find this file called Eli's_Creds.txt which is intresting so we get it to our local machine.

and when we cat it out we see this random mess