Hack The Box - Apocalyst

We are going to pwn Apocalyst from Hack The Box.

Link : https://www.hackthebox.eu/home/machines/profile/57

Lets Begin with our Initial Nmap Scan.

Nmap Scan Results:

22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 fd:ab:0f:c9:22:d5:f4:8f:7a:0a:29:11:b4:04:da:c9 (RSA)
|   256 76:92:39:0a:57:bd:f0:03:26:78:c7:db:1a:66:a5:bc (ECDSA)
|_  256 12:12:cf:f1:7f:be:43:1f:d5:e6:6d:90:84:25:c8:bd (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-generator: WordPress 4.8
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Apocalypse Preparation Blog
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.16 (95%), Linux 3.2 - 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.8 (95%), Linux 4.4 (95%), Linux 4.9 (95%), Linux 3.18 (95%), Linux 4.2 (95%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel


Added apocalyst.htb on /etc/hosts because its not rendering correctly with IP.

Its a Wordpress site.

So I Started Wpscan and found and an user.

Started my Gobuster to bruteforce the directories but everything leads to same image, So I used a tool called cewl to create a wordlist using the webpage and started my Gobuster again with new wordlist and some extra parameters.

cewl - custom word list generator

Why I did this? Because every directory leads to same image file and I can’t check each page so by doing this method we can find something different.

-f, --addslash                      Apped / to each request
-l, --includelength                 Include the length of the body in the output

From the scan result only /Rightiousness/ has different length when compare to others,

/glorification/ (Status: 200) [Size: 157]
/given/ (Status: 200) [Size: 157]
/Rightiousness/ (Status: 200) [Size: 175]
/Job/ (Status: 200) [Size: 157]
/Psalms/ (Status: 200) [Size: 157]

Downloaded the image to my machine.

Used Steghide to extract the files in the image.

steghide - a steganography program

It is a wordlists. So we can brute force the user password with list.txt

wpscan -U falaraki -P ~/CTF/HTB/Boxes/Apocalyst/list.txt --url http://apocalyst.htb/

We got the password for the user. Username: falaraki, Password: Transclisiation

Once Logged in, I searched for anyway to get reverse shell and found we can edit the pages in Appearance --> Editor. I selected one of the page from the templates on the right side of the page. Changed that to PHP Reverse Shell(Don’t forgot to change the IP).

After Uploaded the file, Open the page in new tab and Started my Listener.

I look at the home directory and found .secret which looks like base64 encoded.

There is an online tool called Base64Decode to decode and it gives us me a password.

Logged in with SSH with falaraki : Y0uAINtG37TiNgTH!sUzersP4ss

Privilege Escalation :

Uploaded my Enumeration Script and found this.

[!] fst160 Can we write to critical files?................................. yes!

Since we have write permission, I created a password using openssl to create a new user with root permission.

Added wolf:46Xd.1NlqFBp.:0:0:root:/root:/bin/bash at the bottom.

I’m Root now