Looking Glass

February 10, 2024

First we need to see the open ports in the machine

Once i tried connecting to the ssh ports i get this message

ssh -oHostKeyAlgorithms=+ssh-rsa -o "StrictHostKeyChecking=no" 10.10.7.125 -p 9001

Then i tried accessing the lowest port which is 13783

It says higher which is the opposite of lower

After several attempt on trying the numbers in between

I guessed the correct port and it returns this

Then after looking up into the google this looks like a vigenere cipher

Thus, I will be using this decoder online to decipher. Here's the link

And i get the result

The secret is bewareTheJabberwock

After i put the secret into the ssh

It returns this

Then after that we will run linpeas in the machine

We see some interesting file that is being run by tweedledum user

Then we will put a reverse shell to it so that we can get the tweedledum user

As we can see we can execute the reboot with sudo

After we reboot the machine we see that we got the reverse shell from user tweedledum

Then we cat the txt file in the home directory of that user

Then we actually go to online hash identifier which is this

We see that we get the decrypted SHA256 code here

maybe one of these is the password the password is zyxwvutsrqponmlk

As we can see the users in the /etc/passwd

We will assume that this password belongs to user humptydumpty

Looks like we can't run any sudo in the humptydumpty user

But as we can see we can execute some commands in the alice home directory

After some help from the internet I figured that we can cat the id_rsa of user alice

Then we will just use this key to connect to alice user

When we did linpeas in alice user we discover this

Last updated