Archangel
Task 1: Deploy the machine
Task 2: Get a shell
Question
Find a different hostname
Let's scan the target using
nmap.
$ nmap -sC -sV 10.10.216.22
Starting Nmap 7.92 ( https://nmap.org ) at 2023-12-08 09:44 IST
Nmap scan report for 10.10.216.22
Host is up (0.15s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 9f:1d:2c:9d:6c:a4:0e:46:40:50:6f:ed:cf:1c:f3:8c (RSA)
| 256 63:73:27:c7:61:04:25:6a:08:70:7a:36:b2:f2:84:0d (ECDSA)
|_ 256 b6:4e:d2:9c:37:85:d6:76:53:e8:c4:e0:48:1c:ae:6c (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-title: Wavefire
|_http-server-header: Apache/2.4.29 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 34.64 secondsAs we can see there are three open ports:
Port 22: ssh
Port 80: http
We can now visit the web page through our browser. ![[2 92.png]]
The email address tells us what the other domain is.
Answer
Question
Find flag 1
Let's add
mafialive.thmto our/etc/hostsfile. ![[3 72.png]]We can now check if we can find something in
mafialive.thm. ![[4 57.png]]
Answer
Question
Look for a page under development
We can go to
/robots.txtto see if any pages are disallowed. Those pages could be under development. ![[5 41.png]]Let's go to
/test.php. ![[6 30.png]]
Answer
Question
Find flag 2
Let's try to read the source code of
/test.php. ![[7 24.png]]Looks like we are not allowed to read the
/test.phpsource code.We can use the
php://filterto encode the source code to Base64 and bypass the security.
php://filter
![[8 20.png]]
Let's decode the Base64 string.
The flag is in the comment.
Answer
Question
Get a shell and find the user flag
Let's take a closer look at the
test.phpcode.
test.php
We can see that it disallows the use of
../...Also, the URI must contain
/var/www/html/development_testing.Using this information we can craft an exploit that gives the Apache
àccess.loglogs.
access.log
![[9 15.png]]
Let's intercept the request using Burpsuite. ![[11 8.png]]
We have to change the
User-Agentfield to the following:
![[12 7.png]]
We can now upload a PHP reverse shell to the server. Let's go to Revshells.
Let's brute force the web pages using
gobuster.
Last updated
Was this helpful?