Looks like heart with bleed..

22 ssh OpenSSH 5.9.p1 5ubuntu1.10
80 http Apache 2.2.22
443 https Apache 2.2.22

AES-128-CBC encrypted RSA private key
I tried to crack this, but I couldn’t.

Vulnerabilities related with heartbleed has been detected, better zommed screen-shot:

Links mentioned by nmap:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
http://www.openssl.org/news/secadv_20140407.txt
http://cvedetails.com/cve/2014-0160/

Now I am sure that this site is vulnerable to heart bleed. I need to find a way to make use of it


https://gist.githubusercontent.com/eelsivart/10174134/raw/8aea10b2f0f6842ccff97ee921a836cf05cd7530/heartbleed.py

Amazing website with simple explanation of it security things:

https://xkcd.com/1354/

It means if someone requests for word: HAT, answer outputs HAT and next data which is after HAT(depending on how many letters user requested).

I have run a few times this script and then I notice a change in the output:

hm

Since then password for ssh key has not been cracked, so I decided to try use this string as a password

There is an available tmux session, which is accessible by my user, because it belongs to group hype and I have read/write perm.

https://book.hacktricks.xyz/linux-unix/privilege-escalation

tmux -S /.devs/dev_sess

Thanks to this I can attach to the session with root privileges

By Marceli

Leave a Reply

Your email address will not be published. Required fields are marked *