Hack the Gemini inc:2 (CTF Challenge)

Hello Friends!! Today we are going to breach a new VM lab “Gemini inc:2” of the vulnhub series and before moving ahead you can also take a  look over Gemini inc:1 which we had solved earlier.

Gemini Inc has contacted you to perform a penetration testing on one of their internal systems. This system has a web application that is meant for employees to export their profile to a PDF. Identify any vulnerabilities possible with the goal of complete system compromise with root privilege. To demonstrate the level of access obtained, please provide the content of flag.txt located in the root directory as proof.

You can download it from here: //www.vulnhub.com/entry/gemini-inc-2,234/

Penetration Methodologies:

  • Network Scanning (Netdiscover, Nmap)
  • Obtaining Activation Code (Bash script)
  • Web Directory Enumeration (Dirb)
  • Bypass WAF (Burp Suite)
  • Exploit Remote Code Execution
  • Upload Reverse_ shell
  • Obtain Reverse connection (Netcat)
  • Abusing Redis for privilege escalation
  • Capture the flag

WalkThrough

The first step is as always, running netdiscover on the VM to grab the IP address. In my case, the IP was 192.168.1.103

Once the IP was found, we ran nmap aggressive scan to enumerate all the open ports.

From the nmap scan result, we found port 80 is open for HTTP service, let’s navigate to port 80 in the browser. It put up the Welcome Guest page for login into the web application.

When we didn’t find any remarkable clue from its home page, then without wasting much time, I use dirb for web directory enumeration and ran the following command for .php extension related files:

Hmmm! I fetched some interesting URL, let’s inspect each one-by-one.

So further, we navigate to URL: //192.168.1.103/activate.php and here observe the Activation Form that requires a User ID and Activation Code to activate the account.

Next, we navigate to URL: //192.168.1.103/registration.php and here observe the Register Form to register a new account. So I registered for an account as “raaj”.

By registering as raaj, a new profile has been generated with User ID-14 as highlighted in the below image but still, we need the 6-digit activation code to activate the user “raaj” account.

To obtain an activation code, I try all possible Hit-Try method but all were a proof waste and at last, I found this link where I found a bash script for the activation code.

 

I copied the following code in a text file and save as gemini.sh on the Desktop. Script Source here

And at last, ran the bash script through the following command with user_id “14” to obtain the 6-digit activation code for user “raaj”.

Awesome!! So we cracked the activation code “000511” for user “raaj”

Now, submit your User_id and activated code to activate the account. In my case, my user_id is 14 and the activation code is 000511 for user “raaj”.

Great, I got login of raaj and then further I explored User List where I found all activated account of other users.

Then I check the profile of 9emin1 which was actually named as Gemini and here I found it is an administrator account.

 

Then I check its source code where luckily I found the password hashes. I copied the hash value for its decryption.

Then I use the online MD5 decryption for decrypting the hash value ‘edbd1887e772e13c251f688a5f10c1ffbb67960d’ and finally we obtain the plain text password “secretpassword”.

Then we login into the admin panel with the following credential:

Then navigate to Admin Panel -> Execute Command. But it shows nothing.

At that moment I used Burp suit for intercepting Http request and then further sent the intercepted request into a repeater to assured what kind of Response it is generating.

Here I look at the HTTP traffic and perceive a 403 IP NOT ALLOWED response. Hence proved the web application is running behind some kind of firewall.

Then I Google to bypass WAF through burp suite extension and found a link for “Bypass WAF”

This extension adds headers to all Burp requests to bypass some WAF products. The following headers are automatically added to all requests:

  1. X-Originating-IP: 127.0.0.1
  2. X-Forwarded-For: 127.0.0.1
  3. X-Remote-IP: 127.0.0.1
  4. X-Remote-Addr: 127.0.0.1

In our case, I use “X-Forwarded-For: 127.0.0.1” and then forward the intercepted HTTP request.

Execute Command

Finally, we got the Execute Command page, and it appears to be vulnerable to RCE where we can run system arbitrary command. Therefore, we try some malicious code such as “;ls” but again it’s shows nothing.

Here we need to fix X-Forwarded-For: 127.0.0.1 header for each page and to do so follow the below steps:

  1. Intercept the HTTP request of Execute Command page and go to Options.
  2. Explore Match and Replace setting then click to edit option to modify the request header.
  3. A small window will pop-up for Edit match/replace rule, here paste “X-Forwarded-For: 127.0.0.1” in the replace text field.
  4. Click on Ok and forward the intercepted request.

Now, we can easily exploit RCE vulnerability by uploading our php-reverse-shell. Traverse to the directory: /usr/share/webshells/php/php-reverse-shell.php; here I had modified the IP: 192.168.1.106 [kali IP] and listen port as 1234.

Hey Guys!! You need to pay Attention here:

NOTE: Be careful while executing any command that contains some arguments because here it is executing the command with argument and without spaces. So once again I took the help from Google and found a link for sending command with argument and without spaces.

Now type the following command to execute the uploaded backdoor file but before executing following command do not forget to start netcat listener.

Now, execute the following command to spawn proper tty shell of the target machine.

Now, let’s go for the post-exploitation to obtain the root.txt file and for that, we need to escalated root privilege. First, we traverse to /home directory but didn’t find any valuable file, therefore, we try to enumerate running services with help of the following command.

By executing the above command we enumerated the running services and found port 6379 is used for Redis. And as we knew Redis is a key-value store, often referred to as a NoSQL database. The essence of a key-value store is the ability to store some data, called a value, inside a key. This data can later be retrieved only if we know the exact key used to store it.

From source: //try.redis.io/

Therefore, from its configuration file, we retrieved the auth key “8a7b86a2cd89d96dfcc125ebcc0535e6” so that we can extract information.

Great!! So we got pong response, now let move ahead for extracting information inside it.

Abusing Redis by writing malicious RSA keypair to the disk and for that, you can follow the given below steps and execute the command as described in the below steps.

  1. Generate a malicious RSA keypair with help of keygen.

  1. Prepare the public key by adding newlines with the help of the following command

  1. Load the malicious public key into redis

  1. Set path to dump the content with the help of the following command

  1. Configure the dbfilename as authorized_keys

  1. Save the configuration and exit.

Authenticate via SSH.

Boom!!! We got root access now let’s grab the flag.txt file to finish this challenge completely.

Yuppie!!! Happy Hacking 😉

Author: AArti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here

Leave a Reply

Your email address will not be published. Required fields are marked *