Orcus vm
Hello all. I am working on a project from Http://vulnhub.com called "Orcus"
This is as far as i have gotten. Maybe it will help someone out. I am asking for help at this point.
Lets see how this goes...
ZENMAP SCAN=intense scan -T4 -A -v
OUTPUT:
Starting Nmap 7.40 ( https://nmap.org ) at 2017-03-27 17:42 Central Daylight Time
NSE: Loaded 143 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 17:42
Completed NSE at 17:42, 0.06s elapsed
Initiating NSE at 17:42
Completed NSE at 17:42, 0.00s elapsed
Initiating ARP Ping Scan at 17:42
Scanning 192.168.244.134 [1 port]
Completed ARP Ping Scan at 17:42, 3.14s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 17:43
Completed Parallel DNS resolution of 1 host. at 17:43, 0.24s elapsed
Initiating SYN Stealth Scan at 17:43
Scanning 192.168.244.134 [1000 ports]
Discovered open port 111/tcp on 192.168.244.134
Discovered open port 80/tcp on 192.168.244.134
Discovered open port 22/tcp on 192.168.244.134
Discovered open port 110/tcp on 192.168.244.134
Discovered open port 143/tcp on 192.168.244.134
Discovered open port 443/tcp on 192.168.244.134
Discovered open port 53/tcp on 192.168.244.134
Discovered open port 995/tcp on 192.168.244.134
Discovered open port 139/tcp on 192.168.244.134
Discovered open port 993/tcp on 192.168.244.134
Discovered open port 445/tcp on 192.168.244.134
Discovered open port 2049/tcp on 192.168.244.134
Completed SYN Stealth Scan at 17:43, 0.14s elapsed (1000 total ports)
Initiating Service scan at 17:43
Scanning 12 services on 192.168.244.134
Completed Service scan at 17:43, 11.04s elapsed (12 services on 1 host)
Initiating OS detection (try #1) against 192.168.244.134
NSE: Script scanning 192.168.244.134.
Initiating NSE at 17:43
Completed NSE at 17:43, 31.85s elapsed
Initiating NSE at 17:43
Completed NSE at 17:43, 0.02s elapsed
Nmap scan report for 192.168.244.134
Host is up (0.00050s latency).
Not shown: 988 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 3a:48:6e:8e:3f:32:26:f8:b6:a1:c6:b1:70:73:37:75 (RSA)
|_ 256 04:55:e6:48:50:d6:93:d7:12:80:a0:68:bc:97:fa:33 (ECDSA)
53/tcp open domain ISC BIND 9.10.3-P4-Ubuntu
| dns-nsid:
|_ bind.version: 9.10.3-P4-Ubuntu
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
| http-robots.txt: 30 disallowed entries (15 shown)
| /exponent.js.php /exponent.js2.php /exponent.php
| /exponent_bootstrap.php /exponent_constants.php /exponent_php_setup.php
| /exponent_version.php /getswversion.php /login.php /overrides.php
| /popup.php /selector.php /site_rss.php /source_selector.php
|_/thumb.php
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
110/tcp open pop3 Dovecot pop3d
|_pop3-capabilities: UIDL STLS AUTH-RESP-CODE TOP SASL PIPELINING RESP-CODES CAPA
| ssl-cert: Subject: commonName=localhost/organizationName=Dovecot mail server
| Issuer: commonName=localhost/organizationName=Dovecot mail server
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-10-09T03:44:10
| Not valid after: 2026-10-09T03:44:10
| MD5: ad50 6e67 26f1 7969 4bcd 2696 5347 a592
|_SHA-1: 01e5 ecc7 994a a19d 45e8 f4c2 b4cf 98b5 10a4 771f
|_ssl-date: TLS randomness does not represent time
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100003 2,3,4 2049/tcp nfs
| 100003 2,3,4 2049/udp nfs
| 100005 1,2,3 41663/tcp mountd
| 100005 1,2,3 46138/udp mountd
| 100021 1,3,4 33067/tcp nlockmgr
| 100021 1,3,4 34945/udp nlockmgr
| 100227 2,3 2049/tcp nfs_acl
|_ 100227 2,3 2049/udp nfs_acl
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
143/tcp open imap Dovecot imapd
|_imap-capabilities: Pre-login more LOGIN-REFERRALS have STARTTLS SASL-IR post-login ENABLE capabilities IDLE IMAP4rev1 listed LOGINDISABLEDA0001 LITERAL+ ID OK
| ssl-cert: Subject: commonName=localhost/organizationName=Dovecot mail server
| Issuer: commonName=localhost/organizationName=Dovecot mail server
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-10-09T03:44:10
| Not valid after: 2026-10-09T03:44:10
| MD5: ad50 6e67 26f1 7969 4bcd 2696 5347 a592
|_SHA-1: 01e5 ecc7 994a a19d 45e8 f4c2 b4cf 98b5 10a4 771f
|_ssl-date: TLS randomness does not represent time
443/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 3a:48:6e:8e:3f:32:26:f8:b6:a1:c6:b1:70:73:37:75 (RSA)
|_ 256 04:55:e6:48:50:d6:93:d7:12:80:a0:68:bc:97:fa:33 (ECDSA)
445/tcp open netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
993/tcp open ssl/imap Dovecot imapd
|_imap-capabilities: Pre-login AUTH=PLAINA0001 LOGIN-REFERRALS more have post-login ENABLE capabilities IDLE IMAP4rev1 listed LITERAL+ SASL-IR ID OK
| ssl-cert: Subject: commonName=localhost/organizationName=Dovecot mail server
| Issuer: commonName=localhost/organizationName=Dovecot mail server
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-10-09T03:44:10
| Not valid after: 2026-10-09T03:44:10
| MD5: ad50 6e67 26f1 7969 4bcd 2696 5347 a592
|_SHA-1: 01e5 ecc7 994a a19d 45e8 f4c2 b4cf 98b5 10a4 771f
|_ssl-date: TLS randomness does not represent time
995/tcp open ssl/pop3 Dovecot pop3d
|_pop3-capabilities: UIDL PIPELINING AUTH-RESP-CODE TOP SASL(PLAIN) USER RESP-CODES CAPA
| ssl-cert: Subject: commonName=localhost/organizationName=Dovecot mail server
| Issuer: commonName=localhost/organizationName=Dovecot mail server
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-10-09T03:44:10
| Not valid after: 2026-10-09T03:44:10
| MD5: ad50 6e67 26f1 7969 4bcd 2696 5347 a592
|_SHA-1: 01e5 ecc7 994a a19d 45e8 f4c2 b4cf 98b5 10a4 771f
|_ssl-date: TLS randomness does not represent time
2049/tcp open nfs_acl 2-3 (RPC #100227)
MAC Address: 00:0C:29:2A:B0:D5 (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.6
Uptime guess: 0.014 days (since Mon Mar 27 17:22:59 2017)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=258 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: ORCUS; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results:
|_clock-skew: mean: -5h00m02s, deviation: 0s, median: -5h00m02s
| nbstat: NetBIOS name: ORCUS, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| Names:
| ORCUS<00> Flags: <unique><active>
| ORCUS<03> Flags: <unique><active>
| ORCUS<20> Flags: <unique><active>
| \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
| WORKGROUP<00> Flags: <group><active>
| WORKGROUP<1d> Flags: <unique><active>
|_ WORKGROUP<1e> Flags: <group><active>
| smb-os-discovery:
| OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
| Computer name: \x00
| NetBIOS computer name: ORCUS\x00
| Workgroup: WORKGROUP\x00
|_ System time: 2017-03-27T13:43:18-04:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
TRACEROUTE
HOP RTT ADDRESS
1 0.50 ms 192.168.244.134
NSE: Script Post-scanning.
Initiating NSE at 17:43
Completed NSE at 17:43, 0.00s elapsed
Initiating NSE at 17:43
Completed NSE at 17:43, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 75.88 seconds
Raw packets sent: 1023 (45.806KB) | Rcvd: 1021 (41.606KB)
My firts hint i found was under "smb-security-mode" where message_signing: Disabled (dangerous, but default)
I looked up the samba version "4-3-11 -ubuntu" and found an exploit :
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
So with a mitm attack i can bypass client-signing protection mechanism and spoof SMB2 and SMB3 servers. This will be an option. lets look further.
lets try smbclient -L 192.168.244.134
Here is an apache 2.4.18 vulnerability::::: CVE-2016-4979 284 Bypass 2016-07-06 2016-11-28 5.0
None Remote Low Not required None Partial None
The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
OK i did some digging and found that there is a python script called "jexboss.py" that will scan apache for the vuln and execute code to get a shell.
here is the address for jexboss.py :https://github.com/joaomatosf/jexboss
ok so that was a flop:* --- JexBoss: Jboss verify and EXploitation Tool --- *
| * And others Java Deserialization Vulnerabilities * |
| |
| @author: Jo├Ășo Filho Matos Figueiredo |
| @contact: joaomatosf@gmail.com |
| |
| @update: https://github.com/joaomatosf/jexboss |
#______________________________________________________#
[31m @version: 1.2.3
[0m
[94m * Checking for updates in: http://joaomatosf.com/rnp/releases.txt **
[0m
[32m
** Checking Host: http://192.168.244.134 **
[32m [*] Checking admin-console: [0m [32m [ OK ]
[32m [*] Checking Struts2: [0m [32m [ OK ]
[32m [*] Checking Servlet Deserialization: [0m [32m [ OK ]
[32m [*] Checking Application Deserialization: [0m [32m [ OK ]
[32m [*] Checking Jenkins: [0m [32m [ OK ]
[32m [*] Checking web-console: [0m [32m [ OK ]
[32m [*] Checking jmx-console: [0m [32m [ OK ]
[32m [*] Checking JMXInvokerServlet: [0m [32m [ OK ]
[32m
* Results:
The server is not vulnerable to bugs tested ... :D
[0m
[0m * Info: review, suggestions, updates, etc:
https://github.com/joaomatosf/jexboss
Ok well checked the /tmp/ dir in url and found this link:
0c7aa37c1e5b7386c5d18dba80bb5d3b^118e4111302d35936b445390f58fb9f006cda2dd_0.file._maintenance.tpl.php 2017-03-27 13:38 4.2K
no direct access allowed
I looked at /backups/ and got a downloadable directory.
got some mysql creds ::::::: dbuser
::::::: dbpassword
This works in the /phpmyadmin/ login screen. That is where i take a break. I have been digging for any sign of a flag or enumeration but it seems that i am hitting a wall. I will post any new findings asap! The link for this vm is ::::::https://www.vulnhub.com/entry/hackfest2016-orcus,182