Overpass

What happens when some broke CompSci students make a password manager?

TryHackMe - Overpass Created by NinjaJc01

Scanning (IP : 10.10.233.36)

1. NMAP

> sudo nmap -sC -sV 10.10.233.36

Starting Nmap 7.91 ( https://nmap.org ) at 2021-09-09 06:30 EDT
Nmap scan report for 10.10.233.36
Host is up (0.19s latency).
Not shown: 998 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 37:96:85:98:d1:00:9c:14:63:d9:b0:34:75:b1:f9:57 (RSA)
|   256 53:75:fa:c0:65:da:dd:b1:e8:dd:40:b8:f6:82:39:24 (ECDSA)
|_  256 1c:4a:da:1f:36:54:6d:a6:c6:17:00:27:2e:67:75:9c (ED25519)
80/tcp open  http    Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
|_http-title: Overpass
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 39.57 seconds

2. GoBuster

Bypass the Login page.

http://10.10.99.250/admin/ I see a login page with some javascript files in it. In file login.js found a vulnerability.

I try to set value SessionToken empty in cookie and BOOM !!. I logged in as admin. I says

Welcome to the Overpass Administrator area

A secure password manager with support for Windows, Linux, MacOS and more

Since you keep forgetting your password, James, I've set up SSH keys for you.

If you forget the password for this, crack it yourself. I'm tired of fixing stuff for you. Also, we really need to talk about this "Military Grade" encryption. - Paradox

Decoding the SSH Private Key

To Decode the SSH key I use JohnTheRipper Tool in Kali-Linux. First to convert RSA key to hash I use ssh2john.py script.

Now to crack the hash.

Passphrase for private key is james13. Now to decode it use -

Login to SSH and get user.txt

By the description of admin page it is clear that username is james.

Now for user.txt -

Privileges escalations (root.txt)

There is a weird file todo.txt in james home directory. It gives a hint to see cronjobs. And a weird thing is there in crontabs file.

Then I see that I can edit the /etc/hosts file and change the IP of overpass.thmdomain to my machine and then I can serve any malacious file to run n server as a root.

buildscript.sh

Then I run a python server sering file /downloads/src/buildscript.sh on port 80.

And open a netcat listner to listine the flag echo by vulnerable machine.

And BOOM!! it gives the content of root.txt file.

THANK YOU FOR READING :)

Last updated

Was this helpful?