# THM | CMess

This is a Linux box. You can find it [here](https://tryhackme.com/r/room/cmess).

#### Skill Learned

* Enumerating CMS (Gila)
* Escalation via Cron Wildcards

## NMAP

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fyvdh8cmkMIP2m41evEg0%2Fimage.png?alt=media&#x26;token=5f6934e1-37b4-469e-8758-1afc3ce628a6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FpMlOpDEtQu6e8Gmb70qh%2Fimage.png?alt=media&#x26;token=fe3c08a5-6cf3-4b70-850d-002ad724c845" alt=""><figcaption><p>nmap scan</p></figcaption></figure>

### Port 80

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FfDahTylklhNP2vzHNn10%2Fimage.png?alt=media&#x26;token=2e13adce-c8c3-4768-b325-b4a58a4ab2fc" alt=""><figcaption><p>port 80</p></figcaption></figure>

/robots.txt

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FY2aKvi9uocWg0SHJFgJP%2Fimage.png?alt=media&#x26;token=315fbf7a-d64f-478c-9e8d-dc15ec4630c3" alt=""><figcaption><p>/robots.txt</p></figcaption></figure>

/src/

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FvNHUTsH26CEWs9Z0jS1M%2Fimage.png?alt=media&#x26;token=69e5282a-cef1-4012-97ab-bb8945be2672" alt=""><figcaption><p>/src/</p></figcaption></figure>

We can see there is Apache 2.4.18

/login/

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FlPxVIORPDzc3QuUN2S1j%2Fimage.png?alt=media&#x26;token=12e526c8-795f-4ff7-ae3e-52ee58661f4e" alt=""><figcaption><p>/login/</p></figcaption></figure>

on wfuzz for subdomain we found dev

```
wfuzz -c -u http://cmess.thm/ -H "Host: FUZZ.cmess.thm" -w /usr/share/seclists/Discovery/DNS/shubs-subdomains.txt --hc 302,400 --hw 290
```

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2F6dYGXIlV2ANjoIxTPAEI%2Fimage.png?alt=media&#x26;token=63d53d06-a709-47a1-9bb3-a13d05f04095" alt=""><figcaption><p>wfuzz for subdomain</p></figcaption></figure>

dev.cmess.thm

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FVUo1hcrNHlEyeIprG1Wc%2Fimage.png?alt=media&#x26;token=caf13a63-f291-4b7f-8113-61c333a7fa41" alt=""><figcaption><p>dev.cmess.thm</p></figcaption></figure>

we have the cred, now login and /admin

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FZ292IOS70yjRQXGtaHnu%2Fimage.png?alt=media&#x26;token=7524dc5b-7862-41b5-a60f-6ca1660d0b3a" alt=""><figcaption></figcaption></figure>

## Foothold/shell

found this <https://www.exploit-db.com/exploits/51569>

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FQhpM42xOmVoADC1sz89W%2Fimage.png?alt=media&#x26;token=1ac0d7ae-3382-47ef-bdf0-5e943e8b2a27" alt=""><figcaption><p>running exploit</p></figcaption></figure>

and we are in

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FiB4SrrCONxN4qjF6eQn9%2Fimage.png?alt=media&#x26;token=c32443d0-66df-432e-b94f-eff4ed5fca21" alt=""><figcaption><p>shell</p></figcaption></figure>

## Priv Esc

```
find / -type f -perm -04000 -ls 2>/dev/null
```

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fzr3qn6gYZssFCcr8xpBb%2Fimage.png?alt=media&#x26;token=5a86f8fd-432f-4e66-a16a-81284e507ee0" alt=""><figcaption><p>find / -type f -perm -04000 -ls 2>/dev/null</p></figcaption></figure>

Nothing intersting was found, now let's look for find sensitive files

```
find / 2>/dev/null | grep password
```

found .password.bak

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FBxevDPzHJ9Ic5uUZmbQb%2Fimage.png?alt=media&#x26;token=cb3abdeb-e3fd-43e9-8608-14ddf579154c" alt=""><figcaption><p>found .password.bak</p></figcaption></figure>

found Andre's password

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2F8dA9Oa9D1TgWxcjU5jd8%2Fimage.png?alt=media&#x26;token=25f2b731-5b30-440b-aa85-260b8d50d03b" alt=""><figcaption></figcaption></figure>

and we are in as Andre

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FprXqTJjCMg9VaPmzx48r%2Fimage.png?alt=media&#x26;token=d936bd74-f9c1-4523-9159-225130b8eefc" alt=""><figcaption></figcaption></figure>

found user.txt

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FAThSweHFPVoIJxt1h2J3%2Fimage.png?alt=media&#x26;token=2a51f0eb-88db-4e66-94fa-fe1ac5e57f34" alt=""><figcaption><p>user.txt</p></figcaption></figure>

let's look at crontab&#x20;

```
cat /etc/crontab
```

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FayiJiHAjr9RXhWHai4Zo%2Fimage.png?alt=media&#x26;token=26288da7-b891-41c7-990e-50890d484838" alt=""><figcaption><p>cat /etc/crontab</p></figcaption></figure>

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fj7GuLKmtCioqMMWb6D2s%2Fimage.png?alt=media&#x26;token=4948cff0-b694-48f8-9d17-59bd17609ce0" alt=""><figcaption></figcaption></figure>

I made a mistake in cmd we need '=sh\ runme.sh'

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FiEB8QxALwtZTbuJVSz8J%2Fimage.png?alt=media&#x26;token=c717e24a-38e6-40b8-bf4b-49585a025ebc" alt=""><figcaption></figcaption></figure>

after a minute or 2, we have a bash file

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FDgeuXMr6nDR6bVsnJ3ux%2Fimage.png?alt=media&#x26;token=61335f49-f268-456a-bfb4-2bc16197fab4" alt=""><figcaption></figcaption></figure>

and we are the root
