Just Completed: Chemistry from HackTheBox 🚀
Exploited file upload vulnerabilities, cracked hashes, and leveraged a file-read exploit to gain root access.
Here is how I tackled it:
🔍 Initial Recon:
- Ran rustscan to identify open ports, followed by nmap for deeper analysis.
- Used feroxbuster to locate directories.
🌐 Web Application Discovery:
- Created an account and logged in to the application, where I found a .cif file upload feature.
- Discovered an exploit for this upload functionality, confirming it with a sleep 10 command.
- Uploaded a reverse shell payload and gained a reverse shell from the saved file.
💾 Database Extraction:
- Located a database.db file on the box, dumped it with sqlite3 to retrieve an MD5 hash of the user’s password.
- Cracked the hash using Crackstation, then accessed the box as that user via SSH.
🔒 Privilege Escalation:
- Found a service listening on port 8080, forwarded it to my local machine with SSH.
- Analyzed the service in Burp Suite, identifying it as ahttpio. Discovered an exploit for this service, requiring a specific directory.
- Located the directory with ffuf and used the exploit to read any file as root.
👑 Root Access:
- Accessed root.txt using the file-read exploit and completed the box.
Proof: https://lnkd.in/g94Ey3gz
Writeup: https://lnkd.in/g8C-FimP
#HackTheBox #Cybersecurity #PenTesting #Linux #CTF #InfoSec #EthicalHacking #RedTeam #CyberSkills #BugBounty #CaptureTheFlag #OffensiveSecurity #LearningByDoing
Fullstack Software Developer | Python | Flask | Postgres | Frontend | JavaScript | MySQL | Telegram
2moGood to know! I am happy to recommend you my GitHub: https://github.com/DmitroKDS. Check out my projects. And please leave me a review.