+++ INITIATING LITURGICAL BROADCAST +++

By the Will of the Omnissiah, and the Authority vested in me as Magos Dominus, I transmit this holy data-burst unto the noosphere.


Enumeration

After an nmap scan I checked out that it had 3 open ports

21/tcp open  ftp     syn-ack ttl 63 vsftpd 3.0.3
22/tcp open  ssh     syn-ack ttl 63 OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
80/tcp open  http    syn-ack ttl 63 Apache httpd 2.4.29 ((Ubuntu))
 

Ftp had no anon login enabled so i checked the website.

Inside i found this:

At first it was hella confusing but I figured that agent codenames could just be the alphabet letters , I had some issues with firefox , then I tried with burp and got no luck so I decided to try with curl , and I made a simple python script to cycle thru all the alphabet letters.

Getting chris’s FTP password

Logging into ftp with his account there were 3 files.

Got all of them , and “To_agentJ” mentioned that these pictures had something stored inside , after researching for a bit I found binwalk and after using it I discovered that there was an actual zip file inside.

I extracted it and tried to open it only to find it was password protected.

So as for the hint telling me to use John the ripper I began searching for a way to do this and I found the zip2john utility.

So:

zip2john 8702.zip > hash.txt
john --wordlist=../rockyou.txt hash.txt
 
Password:alien
 

And after I decompressed it I got a txt file called To agent R.

Agent C,

We need to send the picture to 'QXJlYTUx' as soon as possible!

By,
Agent R

A Base64 encoded string which reveals a password , just to check I used it with steghide in the other image and i got a “message.txt”

Hi james,

Glad you find this message. Your login password is hackerrules!

Don't ask me why the password look cheesy, ask agent R who set this password for you.

Your buddy,
chris

I SSH’d into the machine and found the first flag.

Image Incident

So the next flag was to search about the incident in the image , for this I opened a webserver using python and downloaded it to my local machine so i could reverse search.

And i found it was called “Roswell Alien Autopsy”.

Getting the root flag

The CTF was hinting about a CVE , I began enumerating for posible SUID as I usually do , and I found when sudo -l something weird.

(ALL, !root) /bin/bash

After searching on google I found that it was indeed a vulnerability with a CVE associated.

CVE-2019-14287

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

So at the end I figured i could just do sudo -u#-1 /bin/bash

And got root access this way.

Inside root.txt there were the last 2 flags , root and agent R name.


GLORY TO THE OMNISSIAH. PRAISE THE BINARY DIVINE.

+++ LITURGICAL BROADCAST COMPLETE +++