Skip to content

Clue 🔺

Enumeration

We can connect to smb shares

Web server is forbidden

Port 300 is for apache cassandra

Searching for an exploit for freeswitch we have

But doesn't seem to work

The exploit is using the default password ClueCon

So the default password is not set.

Looking in the smb share freswitch we find ClueCon

So the password is set in /etc/freeswitch/autoload_configs/event_socket.conf.xml

Searching an wxploit for cassandra

We can read files so we can try to get the password from before

And the password is different. StrongClueConEight021

Using the exploit from before we can change the password

We can set a reverse shell

Privilege Escalation

ps auxww shows a ruby process with cassie password

cassie:SecondBiteTheApple330

With sudo -l we see that we can execute casandra-web as root so

Now using the same exploit as before for reading files, we would be reading files as root

Start a casandra web on another port and execute the script locally

The script is only making a curl request with 8 ../ so we can make it without script locally

If we see anthony stuff, in bash history we see

So the private key is the same for anthony and root so read id_rsa and login via SSH

Post Exploitation