Hack The Box - Bank

We are going to pwn Bank from Hack The Box.

Link : https://www.hackthebox.eu/home/machines/profile/26

Like always begin with our Nmap Scan.

Nmap Scan Results

22/tcp open  ssh
53/tcp open  domain
80/tcp open  http

22/tcp open  ssh     OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   1024 08:ee:d0:30:d5:45:e4:59:db:4d:54:a8:dc:5c:ef:15 (DSA)
|   2048 b8:e0:15:48:2d:0d:f0:f1:73:33:b7:81:64:08:4a:91 (RSA)
|   256 a0:4c:94:d1:7b:6e:a8:fd:07:fe:11:eb:88:d5:16:65 (ECDSA)
|_  256 2d:79:44:30:c8:bb:5e:8f:07:cf:5b:72:ef:a1:6d:67 (ED25519)
53/tcp open  domain  ISC BIND 9.9.5-3ubuntu0.14 (Ubuntu Linux)
| dns-nsid: 
|_  bind.version: 9.9.5-3ubuntu0.14-Ubuntu
80/tcp open  http    Apache httpd 2.4.7 ((Ubuntu))
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.16 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.4 (95%), Linux 4.2 (95%), Linux 4.8 (95%), ASUS RT-N56U WAP (Linux 3.4) (95%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

When I see the Webpage its default apache2 server so I added bank.htb in /etc/hosts then when I open bank.htb I got an login page.

We have a webpage so why not running Gobuster

Gobuster Results

Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
[+] Url:            http://bank.htb
[+] Threads:        10
[+] Wordlist:       /usr/share/wordlists/dirb/common.txt
[+] Status codes:   200,204,301,302,307,401,403
[+] User Agent:     gobuster/3.0.1
[+] Timeout:        10s
2020/01/26 00:04:15 Starting gobuster
/.hta (Status: 403)
/.htaccess (Status: 403)
/.htpasswd (Status: 403)
/assets (Status: 301)
/inc (Status: 301)
/index.php (Status: 302)
/server-status (Status: 403)
/uploads (Status: 301)
/support.php (Status: 302)
2020/01/26 00:06:33 Finished

From the scan results i tried /index.php but it redirects to /login.php so lets switch on the burp and see whats going on!

Yes when we try to open /index.php a 302 Found which is redirection, We can stop a redirection using burp so lets do that.

All we need to do is change 302 Found to 200 Ok For that open Proxy -> Options -> Match and Replace

Add Now Redirection is stopped , Let see whats in the webpage
It looks like some users bank account details

Finding Upload Vulnerability

There is another webpage support.php Lets see whats inside.

It looks like some kind of upload thing. While Checking the source code found this

Getting Shell

So I uploaded my payload .php as .htb

While Listening on my machine and Pressing the Click Here opened the shell for me!

While enumerating I found some credentials which is located in /www/bank

Privilege Escalation

Found an SUID called emergency in /var/htb/bin

While I tried to execute it give me root