Hey,
Here we are, we have to pass the n00bfilter as we are not n00b :-)
08/05/2010 ---> there was a little confusion in the beginning about the noob filter
[16:00] <@Sud0> none of the filter web page opens :(
[16:01] <@Sud0> http://www1.noob-filter.com / http://www2.noob-filter.com
[16:01] <@Sud0> not working both of the m:(
[06[16:01] <~corelanc0d3r> too much traffic ?
[16:01] <@TecR0c> they are working for me and mr_me
[16:01] <@Sud0> maybe yeah
[16:02] <@Sud0> nope for me not working :'(
[16:02] <@corelanc0d3r> @Tec : any luck with the noob filter ?
[16:02] <@TecR0c> not yet
[16:03] <@TecR0c> ill let you know
[16:03] <@TecR0c> if we get passed it
[16:03] <~corelanc0d3r> k
[16:06] <@TecR0c> hrm
[16:06] <@TecR0c> seems like noob-filter only works with iexplorer
[16:07] <@corelanc0d3r> ok what do we need to do ?
[16:10] <@TecR0c> working with firefox now
[16:10] <@TecR0c> all good
some time later, we got the dot defender key and that's what it looks like (general panic):
[16:21] <@Sud0> anyone here ?
[16:22] <@chap0> yo
[16:22] <@corelanc0d3r> yo
[16:22] <@corelanc0d3r> and ?
[16:23] <@Sud0> i found
[16:23] <@Sud0> http://www1........ /dotdefender
[16:23] <@corelanc0d3r> yeah
[16:23] <@corelanc0d3r> I'm trying the exploit for it
[16:23] <@corelanc0d3r> http://www.exploit-db.com/exploits/10261
but with no success at the beginning (mr_me just arrived ):
[16:24] * mr_me (mr_me@hidden-8B8DC393.lnk.telstra.net) has joined #corelan
[16:24] * corelanOp sets mode: +o mr_me
[16:24] <@Sud0> just tried it
[16:24] <@mr_me> whats the exploit
[16:24] <@TecR0c> does it work ?
[16:24] <@corelanc0d3r> no
[16:24] <@corelanc0d3r> don't think so
[16:24] <@corelanc0d3r> any other services on that server ?
[16:25] <@Sud0> not working
[16:25] <@Sud0> tried it
[16:25] <@Sud0> The Site Management application of dotDefender is reachable as a web
[16:25] <@Sud0> application (https:site/dotDefender/)
[16:25] <@Sud0> on the webserver. After passing the Basic Auth login you can
[16:25] <@Sud0> create/delete applications.
[16:25] <@Sud0> The mentioned vulnerability is in the 'deletesite' implementation and
[16:25] <@Sud0> the 'deletesitename' variable.
[16:25] <@Sud0> Insufficient input validation allows an attacker to inject arbitrary commands.
[16:25] <@Sud0>
[16:25] <@Sud0> we have to pass the basic auth before
Next Step guetting the authentication credentials (due to excitation, chap0 needed three retries so he could write w00t):
[16:29] <@mr_me> we def know the login is admin
[16:29] <@TecR0c> i can confirm that it is admin aswell
[16:29] <@TecR0c> password defined previously
[16:29] <@TecR0c> ;/
[16:29] <@TecR0c> im looking at the installatoin guide
[16:29] <@corelanc0d3r> not sure - it's not because the login says it's admin, that it is admin
[16:29] <@corelanc0d3r> ah ok
[16:29] <@corelanc0d3r> what is the default pass ?
[16:29] <@mr_me> looking for it atm
[16:29] <@TecR0c> doesn't look like there is a default password
[16:29] <@Sud0> found it guys
[16:29] <@Sud0> we have noob1
[16:29] <@Sud0> :d
[16:30] <@Sud0> hahahahahahahahahahahahahahahaha
[16:30] <@Sud0> guys
[16:30] <@Sud0> listen
[16:30] <@Sud0> @corelanc0d3r
[16:30] <@mr_me> i gotr
[16:30] <@mr_me> haha
[16:30] <@Sud0> @mr_me
[16:30] <@mr_me> i logged in
[16:30] <@Sud0> password
[16:30] <@chap0> all ears big ones
[16:30] <@mr_me> hahaha
[16:30] <@Sud0> admin/password
[16:30] <@mr_me> yeh
[16:30] <@chap0> W))T!
[16:30] <@chap0> w001
[16:30] <@chap0> w00t!
[16:30] <@chap0> sry
[16:30] <@chap0> hehehe
[16:30] <@TecR0c> ah
[16:30] <@TecR0c> timing out
[16:30] <@mr_me> its not root
[16:30] <@mr_me> woot nothing
[16:30] <@corelanc0d3r> so - dotdefender password ?
[16:30] <@corelanc0d3r> or just page login ?
[16:30] <@mr_me> admin:password
[16:31] <@mr_me> haha
[16:31] <@TecR0c> ok no one has passed phase 1 yet
[16:31] <@Sud0> admin/password
Then a lot of suspens take a look (mr_me though he was one of apollo staff having issue in space and calling nasa):
[16:32] <@mr_me> we are having issues here
[16:32] <@mr_me> its very slow access
[16:32] <@mr_me> yes
[16:32] <@chap0> si i agree forever and a day to get in
[16:32] <@TecR0c> Lincoln, http://www2.noob-filter.com/dotdefender/index.cgi
[16:32] <@Lincoln> ah k
[16:33] <@Sud0> yes
[16:33] <@Sud0> very slow
[16:33] <@Sud0> i built the header
[16:33] <@Sud0> and executing the command
[16:33] <@Sud0> using the exploit
[16:33] <@Sud0> but problem
[16:33] <@Sud0> very slow
[16:33] <@chap0> my page is still loading
[16:33] <@chap0> :/
[16:33] <@mr_me> me 2
[16:33] <@mr_me> what the
[16:34] <@chap0> waht happen?
[16:34] <@corelanc0d3r> someone DoS'ed it ?
The next minutes some of us are becomin a little bit paranos about user agent
[16:39] <@mr_me> i have the evil RCE request
[16:40] <@mr_me> but its way to slow
[16:40] <@mr_me> the server
[16:40] <@mr_me> this is a joke
[16:40] <@corelanc0d3r> yeah didn't scale very well
[16:41] <@Sud0> waiting result of my ls-als
[16:42] <@mr_me> ok it looks like its ment to be slow
[16:42] <@mr_me> thats the hint i get from muts
[16:42] <@corelanc0d3r> try just catting the file
[16:42] <@corelanc0d3r> from root
[16:42] <@corelanc0d3r> or from current folder
[16:42] <@corelanc0d3r> may be faster
[16:43] <@Sud0> yes
[16:44] <@Sud0> just waiting the page to be loaded
[16:44] <@Sud0> mr_me ---> ment to be slow ?.??????????????
[16:44] <@mr_me> well
[16:45] <@mr_me> i think maybe we change the user agent
[16:46] <@corelanc0d3r> yeah I'll try
[16:46] <@corelanc0d3r> I'll change it to Corelan Team
finally one of us got access to the dotdefender admin page and guess who ? (TecR0c)
[16:47] <@TecR0c> haha
[16:47] <@TecR0c> im in site management
[16:47] <@TecR0c> w00t
[16:47] <@chap0> good at least one of us is
[16:47] <@mr_me> doesnt load past that
[16:47] <@chap0> :D
[16:47] <@chap0> bla
[16:48] <@TecR0c> na still loading
[16:48] <@TecR0c> god damn
[16:49] <@mr_me> sudo
[16:49] <@mr_me> Sud0
[16:50] <@mr_me> did it load for u?
[16:50] <@mr_me> whats the response headers
[16:50] <@mr_me> paste em here
Then we finally could execute the first command on the server (id)
[16:50] <@mr_me> ok
[16:50] *Lincoln* hey
[16:52] <@Sud0> uid=48(apache) gid=494(apache) groups=494(apache)
[16:52] <@Sud0> /usr/local/APPCure-full/lib/admin
[16:52] <@Sud0> uid=48(apache) gid=494(apache) groups=494(apache)
[16:52] <@Sud0> /usr/local/APPCure-full/lib/admin
[16:52] <@Sud0> uid=48(apache) gid=494(apache) groups=494(apache)
[16:52] <@Sud0> /usr/local/APPCure-full/lib/admin
[16:52] <@Sud0> uid=48(apache) gid=494(apache) groups=494(apache)
[16:52] <@Sud0> /usr/local/APPCure-full/lib/admin
[16:52] <@mr_me> NICE
[16:52] <@mr_me> dude
[16:52] <@mr_me> UPLOAD A WEB SHELL
[16:53] <@Sud0> yes will do it ;)
After trying to upload a web shell without success we decided to try an other approach (going directly to the n00bsecret.txt)
[17:32] <@Sud0> mr_me wake up :)
[17:32] <@mr_me> 1 sec
[17:32] <@Sud0> héhé
[17:32] <@corelanc0d3r> can anyone run a find command on the server, to find out where the n00bSecret.txt file is located ?
[17:32] <@mr_me> not fast as u
[17:33] <@corelanc0d3r> they reverted
[17:33] <@Sud0> fine :)
[17:33] <@Sud0> will find it
[17:33] <@Sud0> one sec
[17:34] <@Sud0> /opt/0c2b7b8071ee658e1c957d3b024ff872d2/n00bSecret.txt
[17:34] <@mr_me> how did u get that
[17:34] <@corelanc0d3r> with find command ?
[17:34] <@corelanc0d3r> so can you cat the file ?
[17:34] <@Sud0> cat ->
[17:34] <@Sud0> 4e4a430da8f32cfa4e41a3e7999bee6b11e8f925154d4adedd0749790d0644aaebff21dc18451ad0e2d3d06b639315b41478c23663f743bf8e66fa2661a3f21c
[17:34] <@mr_me> yeh now cat
[17:34] <@Sud0> :D
[17:34] <@mr_me> NICE
[17:34] <@corelanc0d3r> that's the cat ?
[17:34] <@TecR0c> yayyyyyyyyyyy
As the keys life was about 10 mn, First one to gain stage 2 was Mr TecR0c
[17:38] <@TecR0c> 25 points !
[17:39] <@TecR0c> stage 2 !
[17:39] <@corelanc0d3r> guys
[17:39] <@corelanc0d3r> can you please post your findings on dradis
[17:39] <@Sud0> wait
[17:39] <@Sud0> wait
[17:39] <@Sud0> the file n00b
[17:39] <@Sud0> is no longer there
[17:40] <@corelanc0d3r> file changes every few minutes ?
[17:40] <@mr_me> it must
[17:40] <@TecR0c> shit
[17:40] <@mr_me> doesnt work for me
[17:40] <@mr_me> Sud0:
[17:40] <@mr_me> can u cat it for everyone
[17:40] <@mr_me> plz
[17:40] <@mr_me> we have slow requests here
[17:41] <@TecR0c> shti didn't know it can only be used once
[17:41] <@TecR0c> sorry sud0
[17:41] <@Sud0> :'(
Next Chapter : guetting the killthen00b machine
Affichage des articles dont le libellé est Jumping the n00bfilter. Afficher tous les articles
Affichage des articles dont le libellé est Jumping the n00bfilter. Afficher tous les articles
mardi 11 mai 2010
Inscription à :
Commentaires (Atom)