# Chronos

IP: 10.10.10.13

# Enum

  • Ubuntu Apache/2.4.18 on port 80 with default page
  • openssh 7.2p2 on port 22 username enumeration
  • apache2ctl graceful privilege escalation
  • 9.10.3-p4-ubuntu only has DOS vulnerabilities

We see that there is a dns for this which is called cronos.htb, so let's try to attack that instead.

Edit the /etc/hosts file to add 10.10.10.13 cronos.htb inside.

Running a quick command for dig yields us with more dns

~/HTB/results/10.10.10.13 » dig axfr @10.10.10.13 cronos.htb                omar2535@kali

; <<>> DiG 9.16.4-Debian <<>> axfr @10.10.10.13 cronos.htb
; (1 server found)
;; global options: +cmd
cronos.htb.             604800  IN      SOA     cronos.htb. admin.cronos.htb. 3 604800 86400 2419200 604800
cronos.htb.             604800  IN      NS      ns1.cronos.htb.
cronos.htb.             604800  IN      A       10.10.10.13
admin.cronos.htb.       604800  IN      A       10.10.10.13
ns1.cronos.htb.         604800  IN      A       10.10.10.13
www.cronos.htb.         604800  IN      A       10.10.10.13
cronos.htb.             604800  IN      SOA     cronos.htb. admin.cronos.htb. 3 604800 86400 2419200 604800

and we add admin.cronos.htb to our /etc/hosts file.

Navigating to admin.cronos.htb, plugging in admin' -- - for the username and anything for the password will give a valid sql injection.