Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-04-08 05:56 EDT
Nmap scan report for 192.168.1.170
Host is up (0.00054s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 66:6a:8e:22:cd:dd:75:52:a6:0a:46:06:bc:df:53:0f (RSA)
| 256 c2:48:46:33:d4:fa:c0:e7:df:de:54:71:58:89:36:e8 (ECDSA)
|_ 256 5e:50:90:71:08:5a:88:62:7e:81:07:c3:9a:c1:c1:c6 (ED25519)
65530/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
MAC Address: 08:00:27:8D:60:E3 (Oracle VirtualBox virtual NIC)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.59 seconds
Veremos que hay alojada una pagina web en el puerto 65530, si entramos nos pondra escrito un 404 not found, por lo que vamos a realizar un poco de fuzzing.
Vemos que es del usuario adela por lo que vamos a crear un archivo llamado id_rsa en nuestro host:
id_rsa
<ID_RSA>
Ahora le pondremos los permisos adecuados.
chmod 600 id_rsa
Nos conectaremos mediante la clave PEM de la siguiente forma:
ssh -i id_rsa adela@<IP>
Info:
The authenticity of host '192.168.1.170 (192.168.1.170)' can't be established.
ED25519 key fingerprint is SHA256:0ug88klEB+Auk3kP/jhWOHJJZmKXY2RjjR4GnhZdYuQ.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.1.170' (ED25519) to the list of known hosts.
Linux noob 4.19.0-16-amd64 #1 SMP Debian 4.19.181-1 (2021-03-19) x86_64
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Wed Jul 14 02:50:51 2021 from 192.168.1.51
adela@noob:~$ whoami
adela
Y con esto ya estaremos dentro con dicho usuario.
Escalate Privileges
Como vemos que se esta compartiendo la carpeta del usuario adela vamos a probar a crear un enlace simbolico hacia la carpeta de root por si el usuario que esta ejecutando la aplicacion donde se esta compartiendo la carpeta de dicho usuario fuera con privilegios elevados.
Por lo que realizaremos el mismo proceso de antes, para conectarnos con la clave PEM del usuario root.
id_rsa
<ID_RSA_ROOT>
Ahora le pondremos los permisos adecuados.
chmod 600 id_rsa
Nos conectamos con la clave PEM:
ssh -i id_rsa root@<IP>
Info:
Linux noob 4.19.0-16-amd64 #1 SMP Debian 4.19.181-1 (2021-03-19) x86_64
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Wed Jul 14 02:50:11 2021
root@noob:~# whoami
root
Con esto veremos que ya seremos el usuario root, por lo que leeremos las flags del usuario y de root.