Shares

nmap

mkdir nmap
sudo rustscan -a 172.31.1.7 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scan

Enumeration

A file system is open on port 2049, and ssh is weirdly open on port 27853

Looks like we can mount the home folder of user amir

We can mount it by executing the following

Upon digging in the file system, you will notice there's an ssh key inside .ssh folder.

Copy id_rsa to your working directory, and chmod it.

The ssh key is encrypted, it means we have to crack this with john

After a few seconds, you will be able to get the password.

Initial foothold

Using the SSH key, the cracked password, and the knowledge of user amir being existed. Now we can log in. Sweet :D

Privilege Escalation

We can execute python3 as user amy

We can leverage that and gain a shell as amy

And with user amy, we can run sudo command with ssh

Now we can gain root, by executing the following

Enjoy your root privilege. :D

Last updated

Was this helpful?