Sandworm

Recon

nmap_scan.log

HTTPs (443)

HTTP redirects us to HTTPs, and we can encrypt data using PGP.

Writeup.png

/guide allows playing around with PGP encryption.

Download their public key

https://pranabdas.github.io/linux/pgp/arrow-up-righthttps://tldr.inbrowser.app/pages/common/gpgarrow-up-right

Let's generate the key

Get your public key

Writeup-1.png

SSTI

This started smelling like SSTI, so I created script to automatically do the magic for us.

SSTI is confirmed

No luck with SSH.

Reverse Shell (atlas) (Jail)

MySQL

I don't think we are cracking these passwords any time soon....

Enumeration

Upgrading shell fails

There's httpie credentials in user's directory and firejail but no access.

We can login in the admin portal

Writeup-2.png

SSH (22)

We are also able to login in real machine with these credentials

User.txt

Privilege Escalation (atlas)

Check for internal applications.

80, 443 and 5000 is GPG application, 3306 is mysql, but 33060 is unknown.

The application seems to be living in /opt/tipnet

We have tipnet mysql credentials, but it's not a user and database doesn't have anything.

Binary is compiled inside /target/debug and has SUID bit set on.

It seems to be running every 2 minutes

program.d files are used for dependency tracking (?)

We have write access to lib.rs

Upgrade to SSH:

Privilege Escalation (root)

This user previously was jailed and is also part of jailer group.

It's a SUID binary

Subject: firejail: local root exploit reachable via --join logic (CVE-2022-31214)arrow-up-right

Root.txt

Last updated