• SERVICES
    • Mobile Penetration Testing
    • Cloud Penetration Testing
    • Network Penetration Testing
    • OSINT & Social Engineering
    • Web Application Penetration Testing
    • Vulnerability Assessment
  • ABOUT US
  • CONTACT US
Blog
Menu
  • SERVICES
    • Mobile Penetration Testing
    • Cloud Penetration Testing
    • Network Penetration Testing
    • OSINT & Social Engineering
    • Web Application Penetration Testing
    • Vulnerability Assessment
  • ABOUT US
  • CONTACT US
Home  /  New  /  Matrix-2 Walkthrough
22 May 2022

Matrix-2 Walkthrough

Matrix-2 is a Medium Level Boot to Root Challenge, based on Linux Kernel 4.9.0-8-amd64 and Debian version 4.9.130-2, It has an intermediate level of difficulty.

Machine IP: 192.168.1.109

Portscan

The initial method to start with any machine, Portscan.

Nmap scan result shows five ports open. Port (80, 1337, 12322) running “Nginx 1.10.3” HTTP service, port 12320 running ShellInABox & port 12321 running warehouse-sss.

Enumeration

As we enumerate the web application running on port 12322, we found a directory traversal vulnerability in the web application specifically on “https://192.168.1.109:12322/file_view.php”.

Using the vulnerability we discovered few files such as:

  • “/etc/nginx/sites-available/default”
  • “/etc/passwd”, “/var/www/p4ss/.htpasswd”, etc

And we found the credentials of another web application that is running on port 1337.

Username: Tr1n17y

Password (After Decryption): Admin

Gaining User Shell

As we enumerate deep into the web application, we found an image file on “https;//192.168.1.109:1337/h1dd3n.jpg”.

The file contains steganography and after cracking it with “n30” we collect the file “n30.txt” and get the user’s password for the ShellInABox service which is running on port 12320.

We logged in using these credentials.

Username: n30

Password: P4$$w0rd

Privilege Escalation

From “.bash_history” of the user “n30”, we found a script: morphous ‘BEGIN {system(“/bin/sh”)}’

We run the respective script and got the root shell.

Related

Share On
Share on Facebook
Share on Twitter
Share on LinkedIn
Share on Whatsapp
 Previous Article Why you need a Vulnerability Assessment?
Next Article   Web Security Risks

Related Posts

  • [CVE-2021-33570] Postbird 0-day Vulnerability

    May 22, 2022
  • Top Cyber Attacks January-May 2021

    May 22, 2022
  • Mobile Application Security Risks

    May 22, 2022
  • Web Security Risks

    May 22, 2022

Leave a Reply

Cancel reply

Recent Posts

  • Mobile Application Security Risks May 22, 2022
  • You have been hacked! What Now? May 22, 2022
  • Matrix-2 Walkthrough May 22, 2022
  • Web Security Risks May 22, 2022
  • Cloud Threats May 22, 2022

Popular posts

  • [CVE-2021-33570] Postbird 0-day Vulnerability
  • Top Cyber Attacks January-May 2021
  • Mobile Application Security Risks
  • Web Security Risks
  • Matrix-2 Walkthrough

Related posts

  • You have been hacked! What Now?
  • May 22, 2022
  • Top Cyber Attacks January-May 2021
  • May 22, 2022
  • Is your network infrastructure really secure?
  • May 22, 2022
  • [CVE-2021-33570] Postbird 0-day Vulnerability
  • Top Cyber Attacks January-May 2021
  • Mobile Application Security Risks
  • Web Security Risks
  • Matrix-2 Walkthrough

Ratest posts

  • You have been hacked! What Now? May 22, 2022
  • Web Security Risks May 22, 2022
  • Mobile Application Security Risks May 22, 2022
  • Top Cyber Attacks January-May 2021 May 22, 2022
  • [CVE-2021-33570] Postbird 0-day Vulnerability

  • Top Cyber Attacks January-May 2021

  • Mobile Application Security Risks

  • Web Security Risks

Latest Posts

Quick Links

  • SERVICES
    • Mobile Penetration Testing
    • Cloud Penetration Testing
    • Network Penetration Testing
    • OSINT & Social Engineering
    • Web Application Penetration Testing
    • Vulnerability Assessment
  • ABOUT US
  • CONTACT US

We provide a comprehensive range of cybersecurity services to protect your business information and to give you peace of mind

Contact Us

Location: Noida, Uttar Pradesh, India

Whatsapp: +91-726-797-1609

E-mail: hello@tridentsec.io

Follow Us

Subscribe to our blogs