11 minute read

Carrier

Information Gathering

Nmap Port Scan

Nmap performs an automated port scan against the target server to identify open ports and services that may be vulnerable to exploitation. A quick scan of the top 1000 most commonly used ports shows that ports 22 and port 80 are open. Port 22 indicates that SSH is being used for remote management on this Linux server and port 80 shows that the target server is hosting a web server on the local network.

Screenshot

Nmap Script Scan

Nmap also performs an automated script scan by running default scripts against particular services for further automated enumeration. Enumerating SSH shows that OpenSSH 7.6p1 is being used on an Ubuntu Linux server. Port 80 is hosting an Apache HTTP 2.4.18 service with some basic cookies such as PHPSESSID. This indicates that PHP is most likely running on the site.

Screenshot

Nmap UDP Scan

Nmap also can be run in a UDP mode to identify ports and services that are open on the local network using UDP. It appears that UDP port 161 is open which is used for Simple Network Management Protocol. This service is often not hardened and can leave the target server vulnerable to configuration enumeration and editing. A basic script can show that there is some basic SNMP info on the service. While it supports the more secure SNMPv3 the server is also running in an SNMPv1 mode and the default community string ‘public’ is used to authenticate against the service.

Screenshot

Service Enumeration

HTTP Service Enumeration

Browsing to the target server on the Apache service running on port 80 shows a basic login screen for a Lyghtspeed system. Two errors are given but since the service requires authentication no further enumeration can be done on this system. Basic SQL injection attacks do not appear to work on the target web service.

Screenshot

Gobuster Directory Enumeration

Gobuster is used to identify more endpoints on the server and several files are found that include documentation and more. Enumerating these endpoints by hand reveals more about the target service and points to the possible vulnerabilities of the site.

/doc

Documentation on the target service is found at the /doc endpoint on the server. A network diagram and a manual of error codes are given and readable on the local network to unauthenticated users. Default credentials are the chassis serial number and the error codes are indicating that the defaults are being used.

Screenshot

Screenshot

Screenshot

/debug

The /debug endpoint shows the standard PHP version information page, confirming the use of PHP on the target server. While no vulnerabilities are identified on the target service we can further enumerate version information and configuration information of the target web service.

Screenshot

/tools/remote.php

The /tools/remote.php endpoint is executing some code but it only returns the text that a license is expired and exits. The previous error codes have indicated at a license is out of date and a default password is set.

Screenshot

Penetration

SNMP Enumeration

Further SNMP enumeration using the default ‘public’ community string shows some basic information. When using SNMPv2 two MIBs are returned and one of which does not render any information. The single MIB given to the user using default credentials is the serial number for the target server.

Screenshot

HTTP Admin Login

Since SNMP disclosed the serial number of the chassis, the error code indicated that a default administrator password was being used and it is the serial number of the chassis, we can log into the previously shown administrative web portal by using the default credentials. When logging in we are immediately met with the ‘license invalid’ message that was being indicated toward on /tools/remote.php.

Screenshot

Ticketing System Enumeration

The web application appears to be a ticketing system and enumerating the currently open tickets shows that there is an issue of route filtering and that there have been previous issues of BGP re-advertising on the network.

Screenshot

HTTP Service Diagnostics

The diagnostics tab on the administrative web app shows a verify status button that, when clicked, will refresh an output that appears to be a UNIX command output.

Screenshot

Command Injection - Diagnostics

Moving the diagnostics web request to BurpSuite we can see that there is user input being taken that is in base64 encoding. Attempting a basic command injection with a ; and then base64 encoding the payload appears to execute arbitrary bash commands on the target server. Doing this while injecting a reverse shell command allows us to spawn a reverse shell on the target machine.

Screenshot

Screenshot

Screenshot

Screenshot

Reverse Shell as User

The command below was base64 encoded and then requested against the authenticated service. This resulted in a bash reverse shell on the attacking machine, providing us with a root-level shell on the target.

Screenshot

Screenshot

Privilege Escalation

We’re on R1 as indicated by our shell. Going back to the diagram shows that we’re on R1 and we know that there is an FTP server on CastCom within the network 10.120.15.0/24. We know that three networks are attempting to connect to it but are having issues with routes. All of this is indicated in the ticket that was found below on the administrative ticket panel.

Screenshot

We also know that BGP is being advertised on these networks to try to update routes. There are indications that BGP wasn’t configured properly and routes could be injected into the network. It appears that we are on Router 1 due to our hostname on the network.

Screenshot

FTP Server Location

An FTP server was mentioned on the 10.120.15.0/24 network. The bash one-liner below performs an automated ping sweep to locate servers on the network. As we can see from the output, 10.120.15.10 was the only other computer on the network and basic testing with ncat shows that the server is running vsFTPd 3.0.3 on the standard port 21.

for i in {1..254} ;do (ping -c 1 10.120.15.$i | grep "bytes from" &) ;done

Screenshot

BGP Configuration Files

Below shows the basic enumeration of the BGP configuration files on the target server. The presence of these files means that this router is in control of the BGP configuration being advertised on the network. Since we have root access on the router server we can edit these BGP configurations and re-write Layer 3 routing on the network.

Screenshot

Screenshot

Router Interface

After some enumeration, the vtysh binary on the target server allows us to interface with the router and perform the enumeration and configuration of the router. Launching this interface shows that the router is a Quagga 0.99.24.1 router.

Screenshot

BGP Attack

We can reroute the FTP traffic by performing the following steps in the router configuration. This will force the VIP logging into FTP to go through our router to get to it. We can then intercept and steal the password being used. By using TCPdump to monitor the network traffic we can intercept the FTP login as it is occurring through our router.

Screenshot

Screenshot

PCAP Analysis - Root Credentials

After loading the PCAP into Wireshark we can perform a static analysis of the traffic that took place. The username and password for FTP were used which is root:BGPtelc0rout1ng.

Screenshot

SSH Shell as Root

Using the found credentials on the SSH port that is exposed to the local network provides a shell as root.

Screenshot