Toppo 1

Toppo: 1 Vulnhub Walkthrough

Enumeration

nmap

nmap -sC -sV -oA nmap/Toppo 192.168.43.243
Starting Nmap 7.80 ( https://nmap.org ) at 2020-05-17 03:45 EDT
Nmap scan report for Toppo (192.168.43.243)
Host is up (0.00076s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh     OpenSSH 6.7p1 Debian 5+deb8u4 (protocol 2.0)
| ssh-hostkey: 
|   1024 ec:61:97:9f:4d:cb:75:99:59:d4:c1:c4:d4:3e:d9:dc (DSA)
|   2048 89:99:c4:54:9a:18:66:f7:cd:8e:ab:b6:aa:31:2e:c6 (RSA)
|   256 60:be:dd:8f:1a:d7:a3:f3:fe:21:cc:2f:11:30:7b:0d (ECDSA)
|_  256 39:d9:79:26:60:3d:6c:a2:1e:8b:19:71:c0:e2:5e:5f (ED25519)
80/tcp  open  http    Apache httpd 2.4.10 ((Debian))
|_http-server-header: Apache/2.4.10 (Debian)
|_http-title: Clean Blog - Start Bootstrap Theme
111/tcp open  rpcbind 2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100024  1          53154/udp   status
|   100024  1          53934/udp6  status
|   100024  1          58497/tcp   status
|_  100024  1          59067/tcp6  status
MAC Address: 00:0C:29:D9:A7:6B (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.88 seconds

After we put the IP to the web browser, we got this

Nothing seems to be interesting so I went to dirb

dirb

As we can see here there is a admin that might have some interesting stuffs inside, let's take a look into it.

Got this and when we click into the notes.txt

We got the password for the ssh!

ssh

From the password, I guess the username is ted and the password is 12345ted123, then we ssh into the user

We manage to login!

Exploitation

LinEnum.sh

I use this script to enumerate the machine.

By using the python -m SimpleHTTPServer, we can transfer files from our machine to victim's machine

Our Machine:

Victim's Machine:

After that, chmod +x LinEnum.sh to make it executable

run by typing ./LinEnum.sh

SUID mawk

This is probably the vulnerability!

After searching at this site, we can type this command to get root

Navigate to /root to get the flag !

Congratulation!

Last updated

Was this helpful?