Photobomb 10.10.11.182
Last updated
Last updated
Photobomb is a Linux base machine from HackTheBox that required your patience in web application knowledge with command injection techniques and the Linux basic concept of sudo is required on the privilege escalation. It is a basic OSCP-like Box.
Command Injection was found on a download function of this web application, which can help to gain initial access. Linpeas show you there is a problem on a sudo job.
130n@calvinlai.com
Target Machine: 10.10.11.182
Attacker Machine: 10.10.14.7
nmap -p- -T5 --min-rate=1000 10.10.11.182 -oG fkclai.nmap
nmap -p $(grep -Eo '[0-9]{1,5}/open' fkclai.nmap | cut -d '/' -f 1 | tr -s '\n' ',') -sC -sV 10.10.11.182 -o nmap-result.txt
No vulnerability was found on the SSH and HTTP service, it was going to review the web application to check for any information leakage or misconfiguration.
With basic web enumeration, a password was found on a JS file that can log on to an image download function. This download function has a command injection problem.
Command Injection was found on the image download function, the Netcat command can have a response.
After several tries using the payload on the reverse shell generator, the payload in Python format can be used to obtain the reverse shell.
f1d429c717c9e2cebbfaf9ba33aacfc2