HTB | Nibbles
Last updated
Last updated
This is the Box on Hack The Box Linux Privilege Escalation 101 Track. Find the box here.
Enumerating web applications
Guessing probable passwords
IP: 10.10.10.75
Let's visit port 80
nothing was there on dirsearch
on looking at the source code we found /nibbleblog/
Let's fuzz the directory
found http://10.10.10.75/nibbleblog/content/private/users.xml
since we have a username let's try to login http://10.10.10.75/nibbleblog/admin.php
I tried a bunch of passwords admin:admin, admin:Nibble, admin:nibble, admin:nibbles
the last one worked
we have also found http://10.10.10.75/nibbleblog/README
here we found its version
Now there are two ways
Metasploit -> multi/http/nibbleblog_file_upload
I used Metasploit, change the options as below
we found user.txt
we found that we can run /home/nibbler/personal/stuff/monitor.sh without password
since we can run the script as sudo we can modify it to get root
let's append reverse shell to monitor.sh
we are in and found root.txt