Skip to content

Clue 🔺

Enumeration

We can connect to smb shares.

The web server is forbidden.

Port 300 is for Apache Cassandra.

Searching for an exploit for freeswitch:

But it doesn't seem to work.

The exploit is using the default password ClueCon.

So the default password is not set.

Looking in the smb share freeswitch, we find ClueCon.

So the password is set in /etc/freeswitch/autoload_configs/event_socket.conf.xml.

Searching for an exploit for cassandra:

We can read files, so we can try to get the password from before.

And the password is different: StrongClueConEight021.

Using the exploit from before, we can change the password.

We can set a reverse shell.

Privilege Escalation

ps auxww shows a ruby process with the cassie password:

cassie:SecondBiteTheApple330

With sudo -l, we see that we can execute cassandra-web as root, so:

Now, using the same exploit as before for reading files, we would be reading files as root.

Start a cassandra-web on another port and execute the script locally.

The script is only making a curl request with eight ../, so we can do it without the script locally.

If we check Anthony's stuff, in bash history we see:

So the private key is the same for anthony and root, so read id_rsa and login via SSH.

Post Exploitation