OpenKeys is a OpenBSD, medium box is a created by polarbearer & GibParadox. Initial foothold was Bypassing Authentication by using a CVE. which get us user private key. Privilege Escalation as also related to CVE and getting root.
# Nmap 7.80 scan initiated Fri Aug 28 08:43:26 2020 as: nmap -sC -sV -oN nmap/openKeys 10.10.10.199
We only see port
Opening the page in browser we see an login screen
Lets run gobuster and see if we find anything interesting
gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://10.10.10.199/ -x php -o root_php.gobuster
/images (Status: 301)
Enumerating the Web-page we find something interesting when we visit
Reading the swp file we can determine the username as
strings auth.php.swp | tac > auth.phpto convert it to readable file
We also see another very intresting line as
$cmd = escapeshellcmd("../auth_helpers/check_auth " . $username . " " . $password)
which tell us about some
downloading that and checking it we see it is
Analyzing it in
ghidra don’t yeild anything for me.
The Other information we have is that this is a OpenBSD system.
OpenBSD authentication bypass yield me to this blog
which state if we pass
-schallenge as username or
-schallenge:password as password we can bypass any authentication
trying that we can bypass the authentication
we can trick the server by passing
username=jennifer in cookie while login.
and we can get a private key
Using the key we can get the user
Enumerating again i didn’t saw anything interesting
So I went back to that blog and saw we can Privilege Escalate using
xlock (CVE-2019-19520) googling for a POC we find an exploit on github
copying that on the box and running it give us a root shell.
and we have pwned