Skip to content

Latest commit

 

History

History
69 lines (55 loc) · 2.96 KB

markup.md

File metadata and controls

69 lines (55 loc) · 2.96 KB

Hack the Box - Markup

rustscan -a 10.129.95.192 -r 0-65535

image

nmap -Pn -sC -sV -p 22,80,43 10.129.95.192 --min-rate 1000 -oN service.scan

image

HTTP:80 image

Content Discovery

ffuf -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-small.txt:FUZZ -u http://10.129.95.192/FUZZ -mc 200 -t 10 -c

image Did not return any results.

Default Credentials image

admin:admin
administrator:administrator
admin:administrator
admin:password
administrator:password

image

Login successful using default credentials admin:password.

image Username: Daniel

XXE The "order" page is interactive. image image image image

The website uses XML to send the order values to the server, could be vulnerable to XEE. XEE: or XML External Entity attack is a type of attack against an application that parses XML input and allows XML entities. XML entities can be used to tell the XML parser to fetch specific content on the server. image Vulnerable to XXE

Since a LFI exists, find SSH keys for the user Daniel. image

Save the Key to a file id_rsa and give permissions chmod 600 id_rsa. Login with SSH

ssh [email protected] -i id_rsa

image

Privilege Escalation Upload WinPEAS image

Easy Way: image

Hard Way: image