
gobuster found /admin and /etc

3 potential users on system. Alex mentions squid proxy, potential insecure config files and a backup archive. Try ssh brute force with a users list.txt. No luck yet.

some notes on the source code

Found archive.tar using one of the links

Readme file displays...

Researched the link and found this, so expecting to extract something


the other subdirectory displays this...

found a passwd file and conf, password needs to be cracked,


auth_param basic program /usr/lib64/squid/basic_ncsa_auth /etc/squid/passwd
auth_param basic children 5
auth_param basic realm Squid Basic Authentication
auth_param basic credentialsttl 2 hours
acl auth_users proxy_auth REQUIRED
http_access allow auth_users

music_archive:$apr1$BpZ.Q.1m$F0qqPwHSOG50URuOVQTTn.
Used www.hashes.com to find hash

Searched hashcat wiki for the hash type.

Running hashcat to crack the hash.

Found the password!
sq**********
Also, had tried to do steghide and stegseek crack on the piano.jpg found on website. But no luck.
extracted the archive using Borg, which reveals Alex's folder.

Did some searching through each folder

found this file in Desktop

Found this note.txt in Documents which contained Alex's password
alex:S********* = SSH CREDS

found the first flag in user.txt
Also found some files in the Music folder

Check which commands can be run as sudo - a particular sh file in the /etc folder

cat the files in the /etc/mp3backup folder

cat the file which can be run as sudo

backup.sh has 554 file permissions, so chmod it to 777.

used revshells.com to get a bash script, which I pasted above the file content.

started nc listener on port 4444

executed the file with sudo permissions

Oh yeah! Got root.

Cat out the root flag
