Keeper

Majd Abuleil

3 min read

nmap [ IP ] -sCV

Found >>

22/tcp open ssh & 80/tcp open http nginx 1.18.0 (Ubuntu) & 8000/tcp open http SimpleHTTPServer 0.6 (Python 3.10.12)

I don’t find anything in port 8000 BUT in port 80 I found this site >>

Search for Default Credentials for the login page.

The Credential for the login page is >>

Username = root

Password = password

After I login to the site I saw an admin, so I clicked on that and there is a user’s page

There are 2 users there:

1- Lnorgaard

2- Root

Click in lnorgaard and find this:

Press enter or click to view image in full size

I have a comment telling me that the password is Welcome2023!
So, I used the name and this password to connect to the SSH.

User Flag →

Root Privilege →

Now we need the root flag.

I have a zip file.

Use unzip for the file, and there are 2 files in the zip file

1 with kdbx format and the other dmp format.

After that, I searched for a KeePass vulnerability to read the KeePassDumpFull.dmp.

I found this CVE-2023–32784

And a tool to help us read the file.

This tool gives me a password.

I searched and tried to know what the full password is because in the tool it is not complete and clear

In the end, I found that the password is Rødgrød med fløde

Now I need to read the kdbx file, so I install the KeePass tool:
Sudo apt install keepass2

I opened the tool and opened the file, but we need a password to open the file, and we have the password.

I type Rødgrød med fløde did not work so I typed rødgrød med fløde

Here we have a key.

I save this in a keeper.ppk [ ppk is the format of the PuTTY ]

So if I need to use that in ssh I need to transfer the format to pem format.

Here I used the puttygen tool >>> puttygen keeper.ppk -O private-openssh -o keeper1.pem

After this, I used the file to connect to the root user using SSH.

Root Flag →