Panabee: 1 Walkthrough

reference Panabee: 1
target ip 192.168.1.10

use vmware instead of virtualbox for this box

Scan with nmap:

Scan with nmap ssh-auth-methods:

Enumerate Samba shares with enum4linux:

smbclient:

note.txt:

Enumerate Samba users with enum4linux:

Try to guess FTP password with hydra:

1
hydra -L users -P /usr/share/seclists/Passwords/probable-v2-top207.txt 192.168.1.10 ftp -V -I -e nsr -t 4 -T 2 -u

Login into FTP as user goper:

Download .bash_history:

.bash_history reveals a script called /home/goper/backup.sh:

Upload a reverse shell as /home/goper/backup.sh, and get a reverse shell:

Escalate from user goper to user jenny.

Hijack to a python reverse shell with /home/goper/platform.py:

Get a reverse shell as user jenny:

Escalate from user jenny to user root.

Enumerate existed processes, that reveals a tmux session with sharedsessions:

Attach to this session to escalate to user root:

1
tmux -S /opt/.tmux-0/sockets/default

/root/proof.txt:


  • http://panabee.my/Source:
  • /etc/apache2/sites-enabled/000-default.conf:

http://dev.panabee.my, which leads to FTP:

Actually I didn’t find this subdomain before I got the reverse shell as user goper.

I tried to use nmap http-vhosts, but failed:

enum_vhosts.sh
1
2
3
4
while read sub; do
url="${sub}.panabee.my"
curl -s --resolve "${url}:80:192.168.1.10" "http://${url}" -w "${sub}: %{http_code} %{size_download}\n" -o /dev/null
done < "$1"