Teahub
MediumMachines
Overview
Welcome to Teahub!
Our company specializes in the fine art of herbs and botanicals. To keep things "on brand," we’ve moved away from standard version control platforms like GitHub or GitLab. Instead, we’ve deployed our own internal instance called Teahub, a custom-themed server where our developers store all our secret recipes and project files.
Flag format: FLAG{}
Lab Details
Prerequisites & Requirements
- Web Architecture Knowledge: Understanding of how self-hosted Git platforms (like Gitea or GitLab) manage repository data and external migrations.
- Remote Code Execution (RCE) Concepts: Familiarity with how unsanitized user input can be passed to system-level shells to execute arbitrary commands.
- CVE Research Proficiency: Ability to pivot from a software version number to a specific Common Vulnerabilities and Exposures (CVE) entry using databases like NIST or ExploitDB.
- Metasploit Fundamentals: Basic knowledge of the MSFconsole, including searching for modules and configuring
RHOSTS,LHOST, and payloads.
What will you learn?
- Passive Reconnaissance: Identifying software versions through low-noise methods like footer inspection and metadata analysis.
- Command Injection Mechanics: Analyzing how the
git fetchcommand can be subverted via the--upload-packargument (CVE-2022-30781). - Automated Exploit Orchestration: Leveraging the Metasploit Framework to streamline payload delivery and establish a stable Meterpreter session.
- Post-Exploitation Basics: Navigating a compromised Linux environment to locate and extract sensitive flag data.
Tools
- Searchsploit / ExploitDB: Used to find public exploit code and Metasploit modules associated with CVE-2022-30781.
- Metasploit Framework (msfconsole): The primary exploitation engine used to deliver payloads and manage the reverse connection.
- Nmap: For initial service discovery to confirm the presence of HTTP/HTTPS services on the target machine.
Job Positions
Penetration Tester
Tags
Web FootholdLinux MachineNmapMetasploitOutdated Service