HTB | Dog
machine - https://app.hackthebox.com/machines/Dog
IP - 10.10.11.58
NMAP
└─$ nmap -sT -p- --min-rate 1000 10.10.11.58 -Pn -oA nmap_ports
Starting Nmap 7.94SVN ( <https://nmap.org> ) at 2025-03-23 13:21 IST
Nmap scan report for 10.10.11.58
Host is up (0.22s latency).
Not shown: 65533 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 87.84 secondsStarting Nmap 7.94SVN ( <https://nmap.org> ) at 2025-03-23 13:23 IST
Nmap scan report for 10.10.11.58
Host is up (0.24s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 97:2a:d2:2c:89:8a:d3:ed:4d:ac:00:d2:1e:87:49:a7 (RSA)
| 256 27:7c:3c:eb:0f:26:e9:62:59:0f:0f:b1:38:c9:ae:2b (ECDSA)
|_ 256 93:88:47:4c:69:af:72:16:09:4c:ba:77:1e:3b:3b:eb (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-generator: Backdrop CMS 1 (<https://backdropcms.org>)
|_http-title: Home | Dog
| http-git:
| 10.10.11.58:80/.git/
| Git repository found!
| Repository description: Unnamed repository; edit this file 'description' to name the...
|_ Last commit message: todo: customize url aliases. reference:<https://docs.backdro>...
|_http-server-header: Apache/2.4.41 (Ubuntu)
| http-robots.txt: 22 disallowed entries (15 shown)
| /core/ /profiles/ /README.md /web.config /admin
| /comment/reply /filter/tips /node/add /search /user/register
|_/user/password /user/login /user/logout /?q=admin /?q=comment/reply
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
Nmap done: 1 IP address (1 host up) scanned in 17.10 seconds
Port 80
From the nmap we can see that /git is there, we can use git-dumper to dump the files

Let’s visit the website

we also have login portal

Foothold/shell
Found MySQL credentials in settings.php

when trying to login via the credential we found on the CMS login page we get error for the username

Enumerating BackDrop CMS
To find valid user name I will be using this repo
we found the BackDrop CMS version
We have found valid username tiffany
we the credential we get from settings.php we can login

backDrop CMS Exploit via shell.tar.gz upload
we have found the Exploit via searchsploit
Let’s run the script
Find the place to upload the module. This is different from the location of the POC, and only accepts files in tar tgz gz bz2 format. Just repackage it.


we were able to execute commands

We can see there are two users, Let’s reuse the password and see whearter we can SSH or not

and we are in as johncusack

found user.txt
Priv Esc
johncusack have sudo rights over (ALL : ALL) /usr/local/bin/bee
View /usr/local/bin/beethe help document and see that you can execute commands
We can use this eval to get the root shell
and we have root.txt
Last updated