Ethical Hacking class – Metasploit OS challenge.

A combination of the final steps of my college class, a new job and a Pwnagotchi experiment run wild – I have been quite absent. The class I am taking threw us into CTF groups with 10 different challenges to accomplish. I took on Challenge 9:

Seems simple enough right. Well, the configuration of Virtual Box and the provided OVA file was annoying to say the least. I forfeited on the host-only mode and set Virtual Box to “Bridged Adapter” – I wanted to attack the mini-PC from other devices on my network, vice locally within the OS. I did configure my network to secure this preference.

I started off with an NMAP scan of the target: 192.168.1.200

sudo -A -sV -O 192.168.1.200 > metasploit.txt

See nmap.org for modifiers and usage.

Quite fruitful! I see a lot of opportunities were built into this Metasploit OS. I am going to focus on the FTP protocol since it has revealed a file with a potential hint: readthis.txt.


Grabbing the readthis.txt file via FTP protocol

According to our NMAP scan the FTP service allows for “Anonymous” logins. After a quick search and a hint of information from stackoverflow.com – it seems we can simply use the following credentials for access:

Name: anonymous
Password: [email protected]

After a successful login. I use very simple commands to grab the readthis.txt file.

ftp > get readthis.txt

Upon display of the contents of the file I found the file contains login information. This has potential to be the first flag.

Opening up the Metasploit VM of Ubuntu we use the login information above which allowed us to gain root access to the  Ubuntu OS. 

Now we need to look for the hash information on the other user accounts. To find this we must explore two files in the /etc folder:

passwd
shadow

Since John the Ripper likes certain formatting in the password.txt file – we have to use the unshadow linux command to combine the “shadow” and “passwd” files.

unshadow passwd shadow > unshadow.txt

The output of unshadow.txt below reveals our second flag – the hash for elmo.

unshadow.txt file output

Next we move our unshadow.txt file over to our Kali VM and run it against the “rockyou.txt” wordlist in John the Ripper aka “John.” As you can see it grabbed passwords for most of the hashes we fed it below.

results of John running on our unshadow.txt file

If you observe the output from above versus the unshadow.txt file you will notice John did not spit out a password for our cookiemonster hash:

cookiemonster:$1$Lq4lHJ0b$evOHD.itBRq2EupoAw.j..:1005:1005:,,,:/home/cookiemonster:/bin/bash

This of course was not initially clear to me why – but I was certain it was not in the “rockyou.txt” wordlist. So I pulled the string out of the “unshadow.txt” file and ran it separately in a file called “cookiemonster.txt” with an “incremental” modifier for a brute force attack. John took roughly six minutes on my M1 Macbook to find the password:

cookiemonster:eye:1005:1005:,,,:/home/cookiemonster:/bin/bash

You can see in the string, the password is eye.

I chose to run John locally to speed up the process. See Homebrew for information on installing packages in MacOS if interested.

If this password was more complex it could have taken much longer. See this example of some serious hardware for password cracking on #_shellntel Blog.

So as a byproduct of an incorrectly configured FTP protocol and the very fortunate find of the readthis.txt file under “/home/FTP” we were able to login, grab the passwd and shadow files, then utilize John the Ripper to find the flag. Granted this is likely never to happen on a moderately configured system. But still a fun challenge to test beginner Black Hat skills.

Flags found
Root password: CMIT321
# Hash for elmo: $1$M7qExhYD$r0/n6WTwbZDoFBCT5.30o
Password for cookiemonster: eye


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *