Golden Eye
Enumeration
How many ports are open?
$ nmap -sC -sV -p- 10.10.251.158 -oN nmap.out
Starting Nmap 7.91 ( https://nmap.org ) at 2021-06-26 13:25 IST
Host is up (0.15s latency).
Not shown: 65531 closed ports
PORT STATE SERVICE VERSION
25/tcp open smtp Postfix smtpd
|_smtp-commands: ubuntu, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
|_ssl-date: TLS randomness does not represent time
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: GoldenEye Primary Admin Server
55006/tcp open ssl/unknown
| ssl-cert: Subject: commonName=localhost/organizationName=Dovecot mail server
| Not valid before: 2018-04-24T03:23:52
|_Not valid after: 2028-04-23T03:23:52
|_ssl-date: TLS randomness does not represent time
55007/tcp open pop3 Dovecot pop3d
|_pop3-capabilities: TOP UIDL AUTH-RESP-CODE USER PIPELINING STLS RESP-CODES SASL(PLAIN) CAPA
|_ssl-date: TLS randomness does not represent time
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 591.22 secondsTake a look on the website, take a dive into the source code too and remember to inspect all scripts!

Who needs to make sure they update their default password?
What's their password?
Now go use those credentials and login to a part of the site.

It's Mail Time
Take a look at some of the other services you found using your nmap scan. Are the credentials you have re-usable?
If those creds don't seem to work, can you use another program to find other users and passwords? Maybe Hydra? What's their new password?
Inspect port 55007, what services is configured to use this port?
What can you find on this service?
What user can break Boris' codes?
Using the users you found on this service, find other users passwords
Keep enumerating users using this service and keep attempting to obtain their passwords via dictionary attacks.
GoldenEye Operators Training
Try using the credentials you found earlier. Which user can you login as?

Have a poke around the site. What other user can you find?
What was this users password?
Use this users credentials to go through all the services you have found to reveal more emails.
What is the next user you can find from doak?
What is this users password?
Take a look at their files on the moodle (severnaya-station.com)
Download the attachments and see if there are any hidden messages inside them?
Using the information you found in the last task, login with the newly found user.

Take a look into Aspell, the spell checker plugin.

As this user has more site privileges, you are able to edit the moodles settings. From here get a reverse shell using python and netcat.
Privilege Escalation
Enumerate the machine manually.
Whats the kernel version?
Overlayfs Exploit
Fix the exploit to work with the system you're trying to exploit. Remember, enumeration is your key! What development tools are installed on the machine?
Root flag

References
Last updated