Pentesting 101: Act Like a Pirate

Hello and thanks for joining me in the fourth (and probably final for now) series about penetration testing!  Before jumping in, make sure you have read the firstsecond and third parts of this series.  Then you will be ready for today’s installment, where we are going to put on our proverbial pirate costumes and loot our exploited machine for buried treasure and other goodies!

Get a lay of the land

In our last installment, we had just compromised a machine using the Shellshock vulnerability, and were sitting at a meterpreter prompt, indicating that this machine was ripe for exploration and/or looting.

The first thing I like to do with a compromised machine is get a feel for what’s running on it, what the network configuration is like, and how I might be able to leave myself a backdoor for easier access next time.  Typing help and hitting Enter is a good place to get started:

From here, lets type sysinfo and hit Enter:

Ah, interesting.  So it looks like we have Linux machine here running a 3.14.1 kernel.  Lets also type ipconfig to see what networks the machine is connected to:

Sometimes I’ll find a machine that is dual-homed, meaning it is connected to multiple networks.  In this case, however, the machine appears to sit only on the 10.0.0/24 network.

Lets also see what local ports are running services by issuing netstat -ntlp:

Essentially, this tells us that there is a Web service running, as well as SSH, which is typically used as a command-line interface to manage the machine.  Lets keep this in mind for later.

Now use the shell command so we can interact with the system directly, just like we were sitting in front of it:

Find the digital booty

One of the things I like to do from here is conduct some simple searches for files of interest.  This could include Word docs and Excel spreadsheets for starters.  The format for these types of searches is pretty straightforward.  For example, this command will search the entire drive for all files with a .doc extension:

find / -name “*.doc”

Upon doing the search for zip files, I found one juicy result:

Now to get these machines download to your local machine, you have a few options.  From the netstat command we used above, we know that our compromised machine is running a Web server.  Therefore, it makes it very easy for me to copy this .zip file to the machine’s public Web directory, and then grab it from local Web browser.  To get the file copied I issue this command:

sudo cp *.zip /var/www/

Now, I can simply open my local machine’s Web browser and visit the full path to where the file lives:

Great, lets pop open this file and see what’s inside…

Ah, boo!  The user has put a password on this file.  Well, lets use another approach.  Fire up the built-in kali tool called fcrackzip to try and brute-force the password.  The specific command is:

fcrackzip bankaccount.zip

Now, for the sake of this demonstration I’m going to use a shorter wordlist so that the time it takes to crack the password is reduced.  Kali comes with a big set of wordlists you can use in /usr/share/wordlists.  One of my favorite’s is called fasttrack.txt, which contains ~130 common passwords.  So lets try the fcrackzip command again in conjunction with fasttrack.txt:

fcrackzip -D -p /usr/share/wordlists/fasttrack.txt bankaccount.zip

The cracker will then parse through the fasttrack.txt file and try one password at a time against our bankaccount.zip file, eventually finding a match!

(Looks like someone didn’t read FRSecure’s post on picking strong passwords!)

Leave a (back)door open

Now lets say I’ve got to shutdown my local machine but I want easier access to this compromised machine at a later date and time.  One method is to install a persistent service (a.k.a a persistent backdoor) that tries to continually make a connection back to my machine so I don’t have to put so much work into setting up Metasploit, selecting my payload, etc.

Persistent backdoors could probably be a blog post on their own, so I am going to finish up this example in a more straightforward way.  Remember earlier when we noted that the server is running the management service called SSH?  If we could just figure out what the root user’s SSH password was, we could connect back to this machine at any time.  Now, we certainly could just use the passwd command and change the password to something we know, but in a real world scenario, this might alert the system administrators to something being askew.  So lets figure out what the currently set password is.

To begin, lets use the cat command to list the contents of two system files: /etc/passwd and /etc/shadow.  You can read more about these files here, but essentially they work together to store information about the computer’s user accounts and encrypted password information.  Using the screenshot below as reference, copy and paste the contents of these files into two separate files – I called mine passwd.txt and shadow.txt.

Next we will use the unshadow command to combine the passwd.txt and shadow.txt into a file called shadow.txt.

The shadow.txt contains a file format that a popular password-cracking utility called John the Ripper (built into Kali) can use to attempt to crack our compromised machine’s root password.  To sick John the Ripper on our unshadow.txt, we run the john command and, much like with fcrackzip, use it in conjunction with a wordlist.  I am going to assume that the system administrator picked a tough root password, so instead of using fasttrack.txt, I’m going to use the rockyou.txt wordlist, which contains over 14 million passwords!  (Side note: check this site for a large collection of wordlists you can use.)

john –wordlist =/usr/share/wordlists/rockyou.txt unshadow.txt

Now John will begin to do its thing.  You won’t see much in the way of status/progress bars, but you can hit Enter during the process to see how far along John is in chewing through the rockyou.txt file.  And per the screenshot below, we can see that once again we’ve struck gold (the password is password123)!

To test these credentials, we can issue this command:

ssh [email protected]

When prompted, type in password123, and viola, we’re in:

We can now come back to this machine any time we want to!  We can now consider this machine ours, or, as the hacker community likes to say, pwned.

Conclusion

Ah yes, we are unfortunately at the end of this series (insert sad face here), which demonstrated some hands-on hacking.  I had a blast putting it together, and I certainly hope you had fun getting a peek into some of the things you might see on a penetration test.  If you have any questions about this blog series, please let me know.  I can be reached at 952-467-6385 or at [email protected]


FRSecure on FacebookFRSecure on LinkedinFRSecure on TwitterFRSecure on Youtube
FRSecure
FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *