Skip to main content
  1. CTF Writeups/

keeper

·274 words·2 mins
Muqaram Majid
Author
Muqaram Majid
Just jotting down my thoughts

keeper
#

Overview
#

  • OS: Linux
  • IP: 10.129.229.41
  • Difficulty: Easy
  • Platform: HackTheBox
  • OSCP: Yes
  • Lists: N/A

Summary
#

Accessed request tracker software with default creds , found credws in one of the queues for ssh access, ssh as user and found a keypass memory dump file, used script to get masterkey fromt he memory dump which later gave us root access when investigating using kpcli.

Loot
#

Takeaways
Usernamesroot/password

Inorgaard@keeper.htb/Welcome2023! | Inorgaard Helpdesk Agent webmaster@keeper.htb rt@keeper.htb Lise | | Subdomains | tickets.keeper.htb | | | | | rødgrød med fløde |

Enumeration
#

  • nmap scan result
  • 80

Lets visit the subdomain we found and perform dirbusting on it

apparently its using a softwarer called request tracker lets see what it does w chatgpt

hmmm. so its like a place like github where everythign is organized in requests, and i can see that we can request for admin? like give me admin access thats interesting

»|« RT 4.4.4+dfsg-2ubuntu1 (Debian) Copyright 1996-2019 Best Practical Solutions, LLC.

apparently its version 4.4.4 aswell

we got access using default creds root/password

in one of the js files we found with dirbusting we find this

Exploitation
#

ok so on clicking download on this test ticket we are able to view it

hmm, on editing the user we also see this

and with those creds we can ssh and grab the user flag

now lets esc priv

lets get the keypass dumper

git clone https://github.com/vdohney/keepass-password-dumper

we get this as the password which we can now use as the master key rødgrød med fløde

kpcli --kdb passcodes.kdb

we find the putty which we convert into an ssh key using puttygen