New York Flankees
Can you, the rogue adventurer, break through Stefan's defences to take control of his blog! - by ioctl & tgreenMWR
The following post by 0xb0b is licensed under CC BY 4.0
Recon
We start with a Nmap scan and find only two open ports. 22 on which SSH is running, and 8080, which is a web service.

We enumerate the page manually and find a welcome message. This is only a test instance in which Stefan tests his ideas and implementation. His sponsor is Oracle. A first indication of what we are dealing with. But more on that later. We have links to Blog
, Stefan Test
and Admin Login
in the header.
This blog is used to document Stefan's ideas and test his implementation - it is sponsored by his company Oracle

We don't find much at the login. We don't get any feedback, so we can neither enumerate users nor brute-force passwords.

In the header, we find the link Stefan Test
. This redirects us to a static debug HTML page. Here we have two to-dos, a custom authentication is still pending, and a bug should be fixed, which refers to a padding. The terms padding and Oracle, ah well.

In the source, we find a piece of JavaScript that makes a GET request to /api/debug/<HEX_DATA>
. The comments also contain the terms AES, CBC and PKCS. Now we can guess what task we are facing. We need to make use of an AES-CBC padding oracle attack.

If we make a request to /api/debug/<HEX_DATA>
with the hex string from the source we get the message "Custom authentication success"

If we alter the hex data, we get an error.

Flank The Crystal Ball
Since we have a ciphertext and an oracle for /api/debug
leaking information about a correct or an incorrect padding, we are able to attack the endpoint with a padding oracle attack, which is a chosen ciphertext attack. This should allow us to decrypt the found ciphertext in the source.
You can find a related challenge (not a padding oracle) with a manual approach here:
A more comprehensible explanation can be found below and is highly recommended for understanding such an attack:
Fortunately, we don't have to go through the process manually, and we can find some tools on GitHub.
Speeeeeed
A big thank you to 0day for sharing this script with me after solving the challenge, which works much faster than the one I originally used:

Slow - Initial Tool Used
We first used padbuster
, the tool that is showcased at Hacktricks. The following code snippet shows the successful execution. It is important to determine the correct block size, this was done via trial and error. Possible block sizes can be divisors of the message length, which in this case is 80. The block size is 16, and the encoding of the ciphertext is lower hex.
After a long duration, we receive the decryption of the blob. Iit's a credential pair for the admin dashboard, and also the answer to the first question. Using the credentials, we are able to log in and find the first flag. Here, we are able to execute commands, but on execution, we do not get much feedback, only an OK if it was successful.

Code Execution
The first attempt was to spawn a simple reverse shell, but this was not successful, nor was a ping. The command set is probably somewhat limited. As can be seen from the room description, it could be a Docker container, which could explain this. We then tested some binaries. If the execution appears to be successful, we get an OK
back.

We probably can't use nc.

But python instead.

We generate a reverse shell on revshells.com
. We use the Python3 shortest.

Unfortunately, direct execution was not successful. Therefore, we write a Python script, which we bring to the machine with the help of cURL.

Once the script is on the machine, all we have to do is set the permissions to be able to execute it and then run it. The commands are executed one after the other, with a separate request for each one.
We received a connection back, we are root
. Next, we're upgrading our shell first. Furthermore, we then find the docker flag in the environment variable env
.

The Great Escape
As is already assumed, we are in a Docker container.

We use the Docker enumeration script deepce. A bit old, but still efficient and reliable. We see that sock is writable and find a suitable escape on Hacktricks.

We confirmed this again with a manual search.

Quote hacktricks:
If somehow you find that the docker socket is mounted inside the docker container, you will be able to escape from it. This usually happen in docker containers that for some reason need to connect to docker daemon to perform actions.
In this case you can use regular docker commands to communicate with the docker daemon.
We look at which images we have available on the machine. The idea now is to use one of the images, make it run, mount the host directory on it, and change the root directory to it. We then receive full access to the host via ns pid and nsenter cli
. We adapt the commands from hacktricks and reference the used image by its ID. We use the image gradle.

Below are the commands:
We now have access as root to the host and find the final flag at /flag.txt
.

Last updated
Was this helpful?