Description
This is the second in the Matrix-Breakout series, subtitled Morpheus:1. It’s themed as a throwback to the first Matrix movie. You play Trinity, trying to investigate a computer on the Nebuchadnezzar that Cypher has locked everyone else out from, which holds the key to a mystery.
Download the VM from here
Difficulty: Medium-Hard
RECON
port:80
port:1337
When we view the source of the page, we get some hidden gems
And further probes give is a go ahead, we’re not in a rabbit hole
port 12320
Nothing much to call back home.
p12322
There’s a robot text file.
We probe the file : file_view.php which we call and get allowed to access with a status 200 which gives us a clue
Exploit Phase
Now that we have a script file residing on the server, we can use it for our exploitation phase. Let’s see what we find.
We start by a MITM attack by intercepting and manipulating the traffic from the server using burpsuite, below are our findings.
Perfect, let’s play around with the same vulnerability just to verify our findings as well
In the same spirit, we continue probing further with our MITM using burpsuite and verifying our results on the terminal.
The vulnerability that keeps giving. We continue with probing the newly discovered finding .htpasswd further and Voilà
As usual, we verify our findings.
In order to proceed and make sense of our findings, we save the md5 value in a file we name Tr1n17y and attempt to crack it with john, we get the login credentials admin:Tr1n17y from the attempt.
Remember the image we discovered earlier on the source file on port 1337, we revisit it again as we believe it has some steganography information which we can extract and get meaning from
Let us extract the info real quick
Sweet, let’s peep into the file n30.txt. Looks like a password: P4$$w0rd
With this progress, we go back to port 12320 and gain an initial foothold.
We first take a look at the bash history, which gives us a glimpse, maybe we can replay the prompts to get a better understanding of what was happening on the box.
Privilege-escalation
From the history commands which were run, we also run the bash script which gives us root access and finally our root flag.