HackTheBox- Sau

Initial Enumeration
nmap
sql
1 | # Nmap 7.93 scan initiated Sun Jul 9 14:17:54 2023 as: nmap -sC -sV -oN nmap/sau 10.129.26.239 |
Port 55555
Visiting the page we see

Creating a Bucket we get

actionscript
1 | Basket 'vt99o63' is successfully created! |
Changing the configuration of the Box
to proxy response and Expand Forward Path

We can accces the service on port 80
which seem to be maltrail
We see that the version running to be v0.53
which seem to have an RCE
https://huntr.dev/bounties/be3c5204-fbd9-448d-b97c-96a8d2941e87/

Trying the Same payload via the Proxy we see we are able to get Ping Back


Getting Shell



Privilege Escalation

https://gtfobins.github.io/gtfobins/systemctl/#sudo
diff
1 | sudo systemctl |
