HA: Dhanush Vulnhub Walkthrough
Today we are going to solve our Boot to Root challenge called “HA Dhanush”. We have developed this lab for the purpose of online penetration practices. It is based on the weapon that was part of all the wars in medieval times. The Bow and Arrow. As the lab is titled Dhanush. Some information about Indian Mythology and Bows might help. Let’s Solve it!!
Task: To Enumerate the Target Machine and Get the Root Access.
- Network Scanning
- Nmap Scan
- Browsing HTTP Service
- Creating a Dictionary from the Webpage
- Bruteforce the SSH
- Generating SSH Public key for another user
- Logging in as another user
- Privilege Escalation
- Identify Sudo Rights to zip command
- Abusing Sudo Rights
- Reading Root Flag
After downloading, run the Machine in VMWare Workstation. To work on the machine, we will be needing its IP Address. For this, we will be using the netdiscover command. After matching the MAC and IP Address we found the Virtual Machine IP Address to be 192.168.1.101.
Now that we have the Target Machine IP Address, our next logical step would be to do a port scan on the target to get information about the various services that are running on the target machine. We usually do just the Aggressive Scan, but in this case, we are going for all port scan. By default, Nmap scans the most common 1,000 ports for each protocol. So, we can specify -p- to scan ports from 1 through 65535. This is done as it is safe to practice to change the port of a service to an uncommon port. After the scan of all the ports, we see that we have the HTTP service (80), SSH service (65345) running on the Target Machine.
nmap -p- -A 192.168.1.101
Moving on, we observed that we have the HTTP service running. It is probable that a web page is hosted. So, we decided to take a look through our Web Browser. We did thorough browsing of the webpage. We went through its source code and images, but there was no way in or any hint.
Now, before moving further, we thought as this webpage contains tons of information over the Dhanush. Also, these can be probably usernames or passwords. So, we decided to make a dictionary using the cewl command.
cewl http://192.168.1.101/ -w dict.txt cat dict.txt
We decide to start our attempt to exploit this target machine from the port which the author has gone lengths to protect from the naked eye. The port number 65345 with the SSH service. As we have no usernames or the passwords so we decide to bruteforce this ssh login using the dictionary that we just created. We will be using the hydra for the login bruteforce. We are in luck; we got the login credentials for the SSH.
Username: pinak Password: Gandiv hydra -L user.txt -P dict.txt 192.168.1.101 ssh -s 65345 -e nsr
Now that we have the login credentials for the SSH, we decided to login and take a look. We ran the sudo -l command to check the sudoers list and found that cp command which works runs as sarang user without any password, hence it can be used. So, we decided to take a look at the user sarang. In the home directory of sarang we see a hidden directory labelled “.ssh”. We tried to open it but it was restricted.
ssh email@example.com -p 65345 sudo -l cd /home/sarang ls -la cd .ssh
We decided to use the cp command to get inside the sarang user. To do this we will be needing the ssh keys to be present in the .ssh directory inside the sarang user home directory. Now although the file is restricted to read we can use the cp command to send the keys inside that directory. To do this first we need to generate those keys. We will be using the ssh-keygen for that particular purpose. After working with ssh-keygen, we move into the .ssh directory inside the pinak user home directory to find the id_rsa public key. We gave it proper permissions. And moved it to the pinak user home directory as shown in the image given.
ssh-keygen cd .ssh ls chmod 777 id_rsa.pub cp id_rsa.pub /home/pinak
Now that we have transferred the public key, its time use the cp command as user sarang to copy the public key inside the .ssh directory in sarang user home directory. We need to use sudo along with the cp command and provide the source directory and destination directory. After doing this, all we need it to login as sarang with the key that we just transferred. We can see that it works nicely. After the successful login as the user sarang, we ran the sudo -l command again as this user is not root and out target is to get root. We see that the zip command has the sudo right that can be abused to escalate privilege on this machine.
sudo -u sarang /bin/cp ./id_rsa.pub /home/sarang/.ssh/authorized_keys ssh firstname.lastname@example.org -i /.ssh/id_rsa -p 65345 sudo -l
We use recently logged in through ssh as user sarang. Then we use the sudo command to list all the commands the user can run with root privileges and we can see that the user can run zip commands as root without the need to enter any password.
So, now in the process of escalating the privileges from “sarang” to “root”. At first, we create a file ‘raj’ than we perform three different tasks in a single line of code: first, we zip the file ‘raj’ second move it to /home/raj.zip folder and lastly unzip it which will pop the root shell.
touch raj pwd sudo zip /tmp/raj.zip /home/sarang/raj -T --unzip-command="sh -c /bin/bash" cd /root ls cat flag.txt
Finally, we get ‘flag.txt’ inside the root directory. Hence, we accomplished our mission to get the root shell on this Boot2Root Machine.
Author: Pavandeep Singh is a Technical Writer, Researcher and Penetration Tester. Can be Contacted on Twitter and LinkedIn
5 thoughts on “HA: Dhanush Vulnhub Walkthrough”
I can only see Loopback interface on virtual machine downloaded. Could you please help in setting up this machine.
Because of this i couldn’t ping this VM from my KALI
And Ubuntu Login Credentials are also unknown for this VM. Could you please help here
you need just set virtualbox network type like bridge adapter
can someone please explain me the command sudo zip /tmp/raj.zip /home/sarang/raj -T –unzip-command=”sh -c /bin/bash”
and why we used -T
T use for arguments
I try command “sudo -u sarang /bin/cp ./id_rsa.pub /home/sarang/.ssh/authorized_keys” is OK,but I tried to copy to another user’s directory
“sudo -u dhanush ……………” is not allowed to execute.
Comments are closed.