Awesome work Peter. The best part sure is SurgeMail (wtf? Launching executables directly from webbrowser! 🙂 ). And the last part … ow, good joke 🙂 (anyway, wonder who falled into the whoami thingy? :)) . Kudos to all the people involve in the challenge and you for writing up this nice article 🙂 .
thanks for the kind words guys ! We had a lot of fun doing this one… I guess my score would have been better if I didn’t use metaploit features (forgot about that rule when I was taking the challenge) 🙂
Hi depth, I assume you are referring to the cb_shell.pl script ? I’m not sure I understand your comment : This type of “barrowing” is not so nice… – I admitted that I used your code, I did not try to hide anything or state that I wrote the tool. – I gave you full credit. Your name is still in the script – I did not change the source code, only changed the name of the script so other people would not accidentally overwrite it – As far as I know I did not break any copyrights Did I forget something ? Or am I missing something here ?
Great write-up Peter , I’m lucky to have some time to read half of this post ( and i’m really sad not to joined you in this pentesting competition 🙁 ) ! And also good job for all members of the team ( you rocks guys !! ) Regards
Really enjoyed your write-up Peter, and tried out a few of the tools/techniques you applied on the way through. Nice one 😉 Please keep up the good work – I know i’ll be reading along.
By the way : smtx made a nice video about the “ghost challenge”. You can download the video here : Is the link missing? If it’s got deleted, do you have any copy? Thank you for very good article.
You can see the video here : http://www.information-security-training.com/videos/smtx-ghost-challenge-video/
Could someone explain how you launched the executable from the web browser? I was under the impression that Apache only served files for download when you request URLs. How did requesting it for download actually execute it on the server rather than executing it on the client?
I noticed that the webapplication (surgemail) was based on an executable (/scripts/webmail.exe), so that means that the webserver must have a handler for executables on the server side. As a result, if you upload an executable, you can get it to run on the server by calling it from a webbrowser at the client side.