Cryptography no image

Published on May 24th, 2019 📆 | 2248 Views ⚑

0

Hack the Box (HTB) Machines Walkthrough Series — Poison


https://www.ispeech.org

We are continuing with our exploration of Hack the Box (HTB) machines, as we have been for many articles now. This walkthrough is of an HTB machine named Poison.

HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple enumeration plus pentest)  in order to log into the platform and download the VPN pack to connect to the machines hosted on the HTB platform.

Note: Only write-ups of retired HTB machines are allowed. The machine in this article, named Poison, is retired.

The Walkthrough

Let’s start with this machine.

1. Download the VPN pack for the individual user and use the guidelines to login to the HTB VPN.

2. The “Poison” machine IP is 10.10.10.84

3. We will adopt the same methodology of performing penetration testing. Let’s start with enumeration in order to learn as much information about the machine as possible.

4. As usual, let’s start with the Nmap scan to gather more information about the services running on this machine. [CLICK IMAGE TO ENLARGE]
< >





5. As we can see from the above Nmap scan, there are only two ports open: Port 80 and 22. Let’s start the enumeration with port 80.

6. Browsing port 80 reveals the below page, which looks like the golden entry for this box.

7. It says we can test the listed sites. Checking listfiles.php, we can see that at the back end, a browse.php file goes into action and takes the entered file as a query parameter without any filter. Listfiles.php produces pwdbackup.txt as well.
< <10.10.10.84/browse.php?file=listfiles.php>>

8. Entering pwdbackup.txt in the file parameter (Read more...)

Source link

Tagged with:



Comments are closed.