Keeper
Keeper
nmap [ IP ] -sCV
Found →
22/tcp open ssh
80/tcp open http nginx 1.18.0 (Ubuntu)
8000/tcp open http SimpleHTTPServer 0.6 (Python 3.10.12)
I don’t find anything in port 8000 BUT in the port 80 I found this site >>
Username = root
Password = password
After I login to the site I saw an admin so I click on that and there is a user’s page
1- Lnorgaard
2- Root
User Flag →
Privilege to root:
Now we need the root flag.
we have a zip file we use unzip for the file and there is 2 files in the zip file
1 with kdbx format and the other dmp format.
After that I search for a KeePass vulnerability to read the KeePassDumpFull.dmp.
I found this CVE-2023-32784
After I search and try to know what the full password is because in the tool it is not complete and clear
I open the tool and open the file but we need a password to open the file and we have the password.
I type Rødgrød med fløde did not work so I type rødgrød med fløde
Here we have a key.
So if I need to use that in ssh I need to transfer the format to pem format.
Here I used the puttygen tool >>> puttygen keeper.ppk -O private-openssh -o keeper1.pem
After this I used the file to connect to the root user using SSH.
ROOT FLAG
Root Flag →
✌️