Hi, today we’re gonna deal with the vulnerable machine “Eternal-Romance” which I have exploited on cyber security olympiad in Georgia called “CyberCube 2018” Special thanks to Georgian CERT for organizing such events & olympiads annually!
(btw prizes for first 3 place were horrible but it’s ok xD fuck it nvm)

So let’s begin today’s covered topics will be:

  • Various Port Scanning methods (my personal preference)
  • Port Analysis
  • Blind SQL Injection
  • SMB Service Enumeration
  • DNS Zone Transfer Attack
  • Remote Code Execution

Port scanning gave us result:

root@kali:~# nmap -Pn -sV 192.168.88.236

PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.7 (Ubuntu Linux; protocol 2.0)
80/tcp  open  http        Apache httpd 2.4.7 ((Ubuntu))
139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
MAC Address: 08:00:27:D2:91:27 (Oracle VirtualBox virtual NIC)
Service Info: Host: ETERNALROMANCE; OS: Linux; CPE: cpe:/o:linux:linux_kernel

-sV - Banner Grabbing
-T4 - For fast scanning
--script vuln - Running full NSE scripts against our target
-Pn - I always throw a -Pn in there just in case the target blocks ping probes, although it’s optional.

P.S From the beginning when I read that title of this vulnerable machine was EternalRomance I thought it would be easy peasy lemon squeezy with SMB Exploit, but later after trying lot of exploits I found that it was named EternalRomance just because to trick us. (trick was successful in my case… lol I wasted lot of time on that)

Open webservice port: 80

I run the Dirb scan for enumerating directories
root@kali:~# dirb http://192.168.88.236/

---- Scanning URL: http://192.168.88.236/ ----
==> DIRECTORY: http://192.168.88.236/images/                                   
+ http://192.168.88.236/index.html (CODE:200|SIZE:288)                         
+ http://192.168.88.236/server-status (CODE:403|SIZE:294)


I’ve found nothing suspicious here, so I decided to visit webpage to see if there was any kind of hints.

httpauth

I’ve checked the source code of index.html and there I’ve found text which was encrypted via
Base64 encryption.

httpauth
(for base64 decryption I’m using: https://www.base64decode.org/
I decrypted this Base64 encryption and got this result = /cybercube2018-eternalromance It was obvious that this was hidden directory so I entered http://192.168.88.236/cybercube2018-eternalromance

Aaand voila! We’ve got some kind of admin login page here!
Whenever I see such a login page,first thing I do is Blind SQL Injection: 'OR' 1=1 httpauth

We’ve got the “Login Incorrect” message, but hell no! I won’t buy that fairy tales^^
Again I’ve checked source and I see code with this logic: if you would input the given POST parameters (username & password) some kind of image with name samba.png would appear.
When I’ve done this, now I only got this samba image and nothing to grip on, as I already mentioned I’ve tried lot of samba exploits and none of them worked. (no, I lie, actually they worked but no session was created in meterpreter)

So I’ve thought why not to try enumerating SMB folders.

root@kali:~# smbclient -L 192.168.88.236
httpauth

There we see cube2018 folder.

Now we need to access this folder, we run the following command in our terminal:
root@kali:~# smbclient \\\\192.168.88.236\\cube2018
ls

  .                                   D        0  Tue Apr 10 08:29:04 2018
  ..                                  D        0  Mon Apr 23 02:10:56 2018
  Haha.txt                            N       61  Tue Apr 10 04:40:09 2018

Now let’s exit from smb process with Ctrl + C and run the following command in terminal to download Haha.txt from our SMB folder.
smbget smb://192.168.88.236/cube2018/Haha.txt

We’ve got this txt file, now let’s see what’s inside it!
cat Haha.txt
And again we’ve got text which is encrypted via Base64 encryption bmFtZTogZXRlcm5hbHJvbWFuY2UsIHByb3RvY29sOiBkbnMoNTMvdGNwKQo=
Decrypting this text gave us result: `name: eternalromance, protocol: dns(53/tcp)

After few minutes of thinking and googling most common 53 port issues, I realised that it was
DNS Zone Transfer Attack

so I instantly opened-up terminal and run following command:

dig axfr @192.168.88.236 eternalromance
httpauth
Feels nice right? here we got all the information we need for editing our host file, so what are we waiting for?
nano /etc/hosts
Add new line in hosts file
192.168.88.236 cybercube2018.eternalromance.com
It should look like this when you’ll run the following command
cat /etc/hosts
httpauth
Now open up your browser and browse http://cybercube2018.eternalromance.com/ You’ll see login page,as I already told u when I see login page first I run SQL Injection: 'OR' 1=1
httpauth

It works! Now we see only fuckin empty textbox? WTF?

httpauth
(if you thought this then quit pentesting right now please, it’s a RCE my friend)

So we’ve got RCE right now,which means that we can execute any command we want.
After running command ls in terminal, we see that we’ve got 3 files over there, those files are: index.php rce.php test.php
just ignore them… Our mission is to get flag.txt just run the command
cat /home/eviltwin/flag.txt

httpauth
Everything’s done now we’ve got the flag and mission is completed… congratulations!
Hey u there, that’s not the end! READ THIS!

httpauth
P.S You might wonder why we have this text in test.php… Who the hek is Lasha? Lasha Takashvili is my friend, cool guy, author of this vulnerable machine and the guy who inspired me to make this security blog.
Don’t forget to check out his blog, you’ll find lot of amazing boxes there - http://higgsx.github.io