I’m currently working through the eCPPT Network Penetration Testing CTF and I’ve hit a wall on Task 4.
I successfully pivoted from the first compromised machine (server.prod.local) and was able to scan the second target, web.prod.local. I found three open TCP ports there, and while two of them revealed some interesting information, I haven’t been able to identify a clear vulnerability (I thought it would be SPIP, but no luck so far).
I’ve been stuck here for a few days now and would really appreciate a nudge or hint to get me moving in the right direction. Any help would be greatly appreciated!
I am stuck on a total of 9 flags on the eCPPT course skill checks :
Client Side Attacks CTF1 - flag 4
Network Penetration Testing CTF1 - flag 4 & 5
Lateral Movement & Pivoting CTF1 - flag 2, 3 & 5
Command & Control (C2/C&C) CTF 1 - flag 1, 2 & 3
I have the rest of the flags so if you would like to exchange notes let me know
I have no idea how to get flag5 after using my method above to get flag 4. I checked user’s .plan file by finger, it have the auditor’s private key can login, but it cannot login root and cannot view root user home directory, anyone have idea?
You have to login first as an auditor, then sudo -l, there is an entry like: (ALL) NOPASSWD: /usr/bin/pip install *, look for this bin in GTFObins. Good luck.
I don’t really understand how to get the 4th flag. I you can explain me the the theory I could understand it and try to apply it to exploit the vulnerable service. :C
copy the code from above mentioned github repository , create a file ( exploit.py for instance), paste the code, chmod +x and execute it with target ip address like: python3 exploit.py http://10.11.12.13