Box Stats
Box Info | Details |
---|---|
Box Name : | The Server From Hell |
Difficulty : | Medium |
Play : | The Server From Hell |
Recommended : | Yes ![]() |
Summary
Hello, this box is a bit trolling & if you don’t know basic coding you will waste lot of time. Let’s start!
Enumeration/Reconnaissance
The challenge says to start at port 1337.
1 |
|
So let’s do banner grabbing on port 1337. Banner grabbing is to take information about a network service, it’s software name and version etc.
1 |
|
To find the trollface, we will use bash script magic.
1 |
|
Let’s check port 12345
.
1 |
|
Shell as hades
Let’s enumerate NFS, let’s identify the shared directory first.
1 |
|
Let’s mount now & see what the directory contains.
1 |
|
Let’s copy it to our directory. When we try to open it asks for a password:
1 |
|
Let’s crack it using fcrackzip
.
1 |
|
We’ve a username now hades
& a SSH private key. But on port 22 isnt running SSH:
1 |
|
hint.txt
tells us that SSH port is between 2500-4500
, let’s fire up a nmap scan with banner NSE script.
1 |
|
Let’s login now.
1 |
|
We’re into irb
(Interactive Ruby Shell), we can use system
function to execute bash.
1 |
|
Reading root flag
While enumerating, i noticed tar has the cap_dac_read_search
capability. We can bypass file read permission and read whatever file we want.
1 |
|
Let’s read root.txt
1 |
|
The rest of the flags:
1 |
|
You can even get a root shell, try it yourself ;)
Thank You
Thank you for taking the time to read my writeup. If you don’t understand something from the writeup or want to ask me something feel free to contact me through discord(0xatom#8707) or send me a message through twitter 0xatom
Until next time keep pwning hard!