ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Breaking into Ubuntu Server

    Scheduled Pinned Locked Moved IT Discussion
    22 Posts 9 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • IRJI
      IRJ
      last edited by IRJ

      I am trying to break into a Ubuntu server. The server is fully patched and only has one port open which is 80. Apache 2.2.22 is running which unfortunately fixed all critical and high vulnerabilities. Apache is running, but no website is running so web vulns like XSS, PHP, etc will not help me.

      I also did some OS fingerprinting on the box, and I haven't found much. I know it is Ubuntu and that the kernel is somewhere between 3.4-4.2 , but I do not know the exact version.

      Any ideas?

      1 Reply Last reply Reply Quote 1
      • DustinB3403D
        DustinB3403
        last edited by

        Which is it Ubuntu or CentOS?

        I assume you only have remote access?

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • DanpD
          Danp
          last edited by

          Breaking into Ubuntu Server

          I know it is CentOS

          Which is it?

          IRJI 1 Reply Last reply Reply Quote 0
          • IRJI
            IRJ @Danp
            last edited by

            @Danp said in Breaking into Ubuntu Server:

            Breaking into Ubuntu Server

            I know it is CentOS

            Which is it?

            Oops, It is Ubuntu. I already broke into CentOS

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @DustinB3403
              last edited by

              @DustinB3403 said in Breaking into Ubuntu Server:

              Which is it Ubuntu or CentOS?

              I assume you only have remote access?

              Web access, port 80.

              1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender
                last edited by

                lol are you allowed to ask for help on your test 😛

                1 Reply Last reply Reply Quote 1
                • scottalanmillerS
                  scottalanmiller
                  last edited by

                  said in Breaking into Ubuntu Server:

                  2.2.22

                   low: XSS in mod_negotiation when untrusted uploads are supported CVE-2012-2687
                  
                  Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled.
                  
                  Note: This issue is also known as CVE-2008-0455.
                  Reported to security team: 31st May 2012
                  Issue public: 13th June 2012
                  Update Released: 13th September 2012
                  Affects: 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                  
                  low: insecure LD_LIBRARY_PATH handling CVE-2012-0883
                  
                  Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.
                  Reported to security team: 14th February 2012
                  Issue public: 2nd March 2012
                  Update Released: 13th September 2012
                  Affects: 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                  
                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                     low: mod_rewrite log escape filtering CVE-2013-1862
                    
                    mod_rewrite does not filter terminal escape sequences from logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
                    
                    Acknowledgements: This issue was reported by Ramiro Molina
                    Reported to security team: 13th March 2013
                    Issue public: 19th April 2013
                    Update Released: 22nd July 2013
                    Affects: 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                    
                    moderate: mod_dav crash CVE-2013-1896
                    
                    Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
                    
                    Acknowledgements: This issue was reported by Ben Reser
                    Reported to security team: 7th March 2013
                    Issue public: 23rd May 2013
                    Update Released: 22nd July 2013
                    Affects: 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                    
                    1 Reply Last reply Reply Quote 1
                    • scottalanmillerS
                      scottalanmiller
                      last edited by

                       low: mod_log_config crash CVE-2014-0098
                      
                      A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.
                      
                      Acknowledgements: This issue was reported by Rainer M Canavan
                      Reported to security team: 25th February 2014
                      Issue public: 17th March 2014
                      Update Released: 26th March 2014
                      Affects: 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                      
                      moderate: mod_dav crash CVE-2013-6438
                      
                      XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.
                      
                      Acknowledgements: This issue was reported by Ning Zhang & Amin Tora of Neustar
                      Reported to security team: 10th December 2013
                      Issue public: 17th March 2014
                      Update Released: 26th March 2014
                      Affects: 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                      
                      1 Reply Last reply Reply Quote 1
                      • scottalanmillerS
                        scottalanmiller
                        last edited by

                         important: mod_cgid denial of service CVE-2014-0231
                        
                        A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service.
                        
                        Acknowledgements: This issue was reported by Rainer Jung of the ASF
                        Reported to security team: 16th June 2014
                        Issue public: 14th July 2014
                        Update Released: 3rd September 2014
                        Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                        
                        low: HTTP Trailers processing bypass CVE-2013-5704
                        
                        HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier.
                        
                        This fix adds the "MergeTrailers" directive to restore legacy behavior.
                        
                        Acknowledgements: This issue was reported by Martin Holst Swende.
                        Reported to security team: 6th September 2013
                        Issue public: 19th October 2013
                        Update Released: 3rd September 2014
                        Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                        
                        moderate: mod_deflate denial of service CVE-2014-0118
                        
                        A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration.
                        
                        Acknowledgements: This issue was reported by Giancarlo Pellegrino and Davide Balzarotti
                        Reported to security team: 19th February 2014
                        Issue public: 14th July 2014
                        Update Released: 3rd September 2014
                        Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                        
                        moderate: mod_status buffer overflow CVE-2014-0226
                        
                        A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page.
                        
                        Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI
                        Reported to security team: 30th May 2014
                        Issue public: 14th July 2014
                        Update Released: 3rd September 2014
                        Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                        
                        1 Reply Last reply Reply Quote 1
                        • IRJI
                          IRJ
                          last edited by

                          Thanks @scottalanmiller , but I already saw those and known of them help me. XSS isn't possible when there is no website on the box. The apache service is all that is running. A DoS is nice for an attack, but it doesn't help me gain access.

                          1 Reply Last reply Reply Quote 0
                          • dafyreD
                            dafyre
                            last edited by

                            What error do you get when trying to browse to it?

                            Could it be the site is listening only on the IP address and not listening for any particular hostname?

                            IRJI 1 Reply Last reply Reply Quote 0
                            • IRJI
                              IRJ @dafyre
                              last edited by

                              @dafyre said in Breaking into Ubuntu Server:

                              What error do you get when trying to browse to it?

                              Could it be the site is listening only on the IP address and not listening for any particular hostname?

                              no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                              I did an http vuln scan and the only file it sees is index.html which is just the default page.

                              dafyreD 1 Reply Last reply Reply Quote 0
                              • dafyreD
                                dafyre @IRJ
                                last edited by

                                @IRJ said in Breaking into Ubuntu Server:

                                @dafyre said in Breaking into Ubuntu Server:

                                What error do you get when trying to browse to it?

                                Could it be the site is listening only on the IP address and not listening for any particular hostname?

                                no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                                I did an http vuln scan and the only file it sees is index.html which is just the default page.

                                Time to throw out Scott's favorite word: Red Herring ?

                                IRJI BRRABillB stacksofplatesS 3 Replies Last reply Reply Quote 0
                                • IRJI
                                  IRJ @dafyre
                                  last edited by

                                  @dafyre said in Breaking into Ubuntu Server:

                                  @IRJ said in Breaking into Ubuntu Server:

                                  @dafyre said in Breaking into Ubuntu Server:

                                  What error do you get when trying to browse to it?

                                  Could it be the site is listening only on the IP address and not listening for any particular hostname?

                                  no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                                  I did an http vuln scan and the only file it sees is index.html which is just the default page.

                                  Time to throw out Scott's favorite word: Red Herring ?

                                  There are plenty of decoys so it wouldn't surprise me.

                                  1 Reply Last reply Reply Quote 0
                                  • BRRABillB
                                    BRRABill @dafyre
                                    last edited by

                                    @dafyre said in Breaking into Ubuntu Server:

                                    @IRJ said in Breaking into Ubuntu Server:

                                    @dafyre said in Breaking into Ubuntu Server:

                                    What error do you get when trying to browse to it?

                                    Could it be the site is listening only on the IP address and not listening for any particular hostname?

                                    no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                                    I did an http vuln scan and the only file it sees is index.html which is just the default page.

                                    Time to throw out Scott's favorite word: Red Herring ?

                                    If you only knew how many times I've seen that already today.

                                    1 Reply Last reply Reply Quote 2
                                    • stacksofplatesS
                                      stacksofplates @dafyre
                                      last edited by

                                      @dafyre said in Breaking into Ubuntu Server:

                                      @IRJ said in Breaking into Ubuntu Server:

                                      @dafyre said in Breaking into Ubuntu Server:

                                      What error do you get when trying to browse to it?

                                      Could it be the site is listening only on the IP address and not listening for any particular hostname?

                                      no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                                      I did an http vuln scan and the only file it sees is index.html which is just the default page.

                                      Time to throw out Scott's favorite word: Red Herring ?

                                      There is nothing extra in the index.html?

                                      No port knocking set up for another port?

                                      IRJI 1 Reply Last reply Reply Quote 0
                                      • IRJI
                                        IRJ @stacksofplates
                                        last edited by

                                        @stacksofplates said in Breaking into Ubuntu Server:

                                        @dafyre said in Breaking into Ubuntu Server:

                                        @IRJ said in Breaking into Ubuntu Server:

                                        @dafyre said in Breaking into Ubuntu Server:

                                        What error do you get when trying to browse to it?

                                        Could it be the site is listening only on the IP address and not listening for any particular hostname?

                                        no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                                        I did an http vuln scan and the only file it sees is index.html which is just the default page.

                                        Time to throw out Scott's favorite word: Red Herring ?

                                        There is nothing extra in the index.html?

                                        No port knocking set up for another port?

                                        Not that I can see. I used Acunetix Web Vulnerability Scanner and it does a pretty good job of analyzing the files.

                                        1 Reply Last reply Reply Quote 1
                                        • stacksofplatesS
                                          stacksofplates
                                          last edited by

                                          As an aside, this sounds like a really interesting test.

                                          1 Reply Last reply Reply Quote 0
                                          • MattSpellerM
                                            MattSpeller
                                            last edited by

                                            I find that a slot and phillips #2 are enough for most.

                                            Occasionally I have to break out the baseball bat or crowbar but those are really more for my pleasure than anything.

                                            1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post