admin


After performing some basic enumeration, I have looked through the system to find a way to make a lateral movement to the admin user Interestingly, the admin user has the unusual UID of 4000000000

While doing so, I also found out that the target SSH server only allows root and mango users for authentication, excluding the admin user

This gives me the idea that the password reuse might still be valid for the admin user although Hydra was unable to authenticate via SSH due to the reason above Therefore, I could just attempt to switch to the admin user from within the system

mango@mango:/dev/shm$ su admin
password: 
$ whoami
admin
$ hostname
mango
$ ifconfig
ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.10.10.162  netmask 255.255.255.0  broadcast 10.10.10.255
        inet6 fe80::250:56ff:feb9:ab29  prefixlen 64  scopeid 0x20<link>
        inet6 dead:beef::250:56ff:feb9:ab29  prefixlen 64  scopeid 0x0<global>
        ether 00:50:56:b9:ab:29  txqueuelen 1000  (Ethernet)
        RX packets 19791355  bytes 3143529560 (3.1 GB)
        RX errors 0  dropped 58  overruns 0  frame 0
        TX packets 18689587  bytes 9750880738 (9.7 GB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 118191  bytes 10187807 (10.1 MB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 118191  bytes 10187807 (10.1 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

Password reuse confirmed for the admin user Lateral Movement made to the admin user