HTB | Nibbles
This is the Box on Hack The Box Linux Privilege Escalation 101 Track. Find the box here.
Skill Learned
Enumerating web applications
Guessing probable passwords
NMAP
IP: 10.10.10.75
nmap -sT -p- --min-rate 10000 10.10.10.75

Port 80
Let's visit port 80

nothing was there on dirsearch

on looking at the source code we found /nibbleblog/

Let's fuzz the directory

found http://10.10.10.75/nibbleblog/content/private/users.xml

Foothold/shell
since we have a username let's try to login http://10.10.10.75/nibbleblog/admin.php

I tried a bunch of passwords admin:admin, admin:Nibble, admin:nibble, admin:nibbles
the last one worked

we have also found http://10.10.10.75/nibbleblog/README
here we found its version

Now there are two ways
Metasploit -> multi/http/nibbleblog_file_upload
I used Metasploit, change the options as below

we found user.txt

Priv Esc
we found that we can run /home/nibbler/personal/stuff/monitor.sh without password

since we can run the script as sudo we can modify it to get root
let's append reverse shell to monitor.sh


we are in and found root.txt
Last updated