Writeup by wook413

Recon

Nmap

As always, I started with a comprehensive TCP port scan followed by a targeted scan on the discovered ports, and lastly a UDP scan on the top 10 ports.

Initial Access

FreeBSD ident 113

I attempted to interact with the service with telnet but didn’t get much information from it.

Whenever I encounter services I’m not familiar with, HackTricks is my go-to resource. Upon reading its page about ident, I learned about Ident-user-enum tool which could help me gather existing usernames.

image-20260129195235009

ident-user-enum revealed user eleanor .

PostgresSQL 5432

I found that I was able to interact with the PostgresSQL service using the default credentials:postgres:postgres . However, I was not able to find any helpful leads in the database.

HTTP 8080

Navigating to /issues/gantt brought up the login page. I entered the default credentials admin:admin , and it prompted me to change my password which indicates I’m logged in as admin.

image-20260129195246218

I found some version information of the services running on the server. However, I failed to find any known vulnerabilities associated with the versions.

image-20260129195251598

snet-sensor-mgmt 10000

Port 10000 appears to be running Webmin, a web-based server management tool. Aside from identifying the service, no further leads for exploitation were found.

image-20260129195302266

Shell as eleanor

SSH 22

I successfully logged into the SSH server using the credentials eleanor:eleanor . It’s very typical in a CTF environment for the user’s password to be identical to the username.

The whoami command did not go through. It appeared that I was in a restricted shell, rbash.

The PATH environment variable was set to /home/eleanor/bin , indicating that only the executables inside that directory are available.

Among the binaries, ed stood out to me. According to GTFObins , we can spawn an interactive system shell. This probably can help us bypass rbash.

image-20260129195317347

I originally attempted to change the value of PATH environment variable but it was blocked by rbash. However, I was able to escape this restriction by using the ed editor. Since ed can spawn a new, unrestricted shell with the !/bin/bash command, I was able to bypass the rbash limitations and reset my PATH .

Now I can use all of the default binaries including which . I stabilized the current shell using Python and re-defined the PATH variable again.

found local.txt

Privilege Escalation

Docker Group

id command revealed eleanor is part of docker group.

Shell as root

In Linux, anyone in Docker group can interact with the Docker daemon without using sudo . Since the Docker daemon runs with root privileges, a user can abuse this to gain full control over the host system.

The command docker run -v /:/mnt --rm -it redmine chroot /mnt sh performs several critical actions.

found proof.txt