IRC
Nmap discovered a IRC service running on the target port 6698
, 8067
, and 65534
internet relay chat (irc) is a text-based chat system for instant messaging. IRC is designed for group communication in discussion forums, called channels, but also allows one-on-one communication via private messages as well as chat and data transfer, including file sharing.
internet relay chat is implemented as an application layer protocol to facilitate communication in the form of text. The chat process works on a client–server networking model. Users connect, using a client—which may be a web app, a standalone desktop program, or embedded into part of a larger program—to an IRC server, which may be part of a larger IRC network. Examples of programs used to connect include Mibbit, IRCCloud, KiwiIRC, and mIRC.
unrealircd is “one of the most popular and full-featured IRC daemons”, and is used on the largest number of IRC servers, according to SearchIRC.com. This server is described as having “possibly the most security features of any IRC server.”
There also is a security issue to the version
3.2.8.1
, I will keep an eye on this.
nmap also enumerated that the exact service, unrealircd, as well as an admin email address attached to it; djmardov@irked.htb
.
As the email address contains a domain information, I appended it to the
/etc/hosts
file on Kali for local DNS resolution
Kali does not come with any IRC client by default, so I’m going to need one for enumeration. i will go with irssi
irssi
┌──(kali㉿kali)-[~/archive/htb/labs/irked]
└─$ irssi $IP
Initializing
Upon entering, I am greeted with a prompt.
Port 6697
I was able to connect to the target IRC server on port
6697
The IRC server is running Unreal 3.2.8.1
With the
/admin
command, I got the admin’s username; bob
It would appear there isn’t any channel in this IRC server
Port 65534
The IRC server on the target port
65534
also uses Unreal 3.2.8.1
It also notes there is an invisible user.
It doesn’t seem like there is any channel here either.
Vulnerablity
┌──(kali㉿kali)-[~/archive/htb/labs/irked]
└─$ searchsploit UnrealIRCd 3.2.8.1
------------------------------------------------------------- ---------------------------------
Exploit Title | Path
------------------------------------------------------------- ---------------------------------
UnrealIRCd 3.2.8.1 - Backdoor Command Execution (Metasploit) | linux/remote/16922.rb
UnrealIRCd 3.2.8.1 - Local Configuration Stack Overflow | windows/dos/18011.txt
UnrealIRCd 3.2.8.1 - Remote Downloader/Execute | linux/remote/13853.pl
------------------------------------------------------------- ---------------------------------
shellcodes: No Results
papers: No Results
Upon searching on Exploit-DB, I discovered that UnrealIRCd 3.8.2.1
is [[Irked_CVE-2010-2075#CVE-2010-2075|vulnerable]] to a number of exploits