Keeper

Nmap Scan

$ nmap -sC -sV -Pn -oN nmap 10.10.11.227                     
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-27 09:14 +08
Nmap scan report for 10.10.11.227
Host is up (0.0067s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 35:39:d4:39:40:4b:1f:61:86:dd:7c:37:bb:4b:98:9e (ECDSA)
|_  256 1a:e9:72:be:8b:b1:05:d5:ef:fe:dd:80:d8:ef:c0:66 (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: nginx/1.18.0 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.84 seconds

Initial Access

Port 80

There is a website hosted on port 80. They only tell us to visit this webpage to raise an IT support ticket.

So I added tickets.keeper.htb into the host file.

After adding to the host file, I visited the website and it shows me this.

From the top right I can see that it is a Request Tracker and since this is a login page, I searched up for default credentials if there are any. After searching, there are default credentials for this software.

After trying the default username and password, I am able to login.

I will then go to the User tab under Admin to see if there is any other users.

From here, I can see there is another user called Inorgaard.

If I click into it, we can see that the password for the user lnorgaard is Welcome2023!

After trying the credentials, I am able to login into the system as lnorgaard.

Privilege Escalation

KeePass dump

When I check the local directory, I can see that there is a RT30000.zip folder.

I will then unzip the file to see what is the content of the zip.

The zip file contains the KeePassDumpFull.dmp and passcodes.kdbx. I will then extract out passcodes.kdbx.

However, when I tried to crack the password, it does not seems successful.

After searching online to see if there any uses for the KeePassDumpFull.dmp file, I can see that maybe we can get the master key password from the dump file instead.

After moving the dump file into the same folder as the poc script, I will run the script. However, there are multiple possible password.

However, there is a slight issue, this does not make sense. So i went to copy ●ldgr●d med fl●de into google and this is what i was returned.

So the possible password could be this: rødgrød med fløde

So I tried enter that as the master password for the keepass file

Sure enough, it works

Puttygen convert to openssh key

After clicking on root, we can see that there is a private key being inserted into the notes section.

I need to use puttygen to generate the private key. After which, I am able to login as root.

Last updated