Hack The Box: Instant

Description Instant is a medium Hack The Box machine that features: Leaked Administrator JWT token in the source code of an Android application package Subdomain enumeration in the XML network configuration of an Android application package API enumeration using one subdomain that provides the application documentation Brute Force to the login endpoint to recover the weak password of an API user Path Traversal vulnerability in an API endpoint that allows reading an user SSH private key Privilege Escalation by the decryption of a backup from the Solar-Putty application using a previously obtained password Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.132.27. ...

March 1, 2025 · 7 min

Hack The Box: Cicada

Description Cicada is an easy Hack The Box machine that features: Domain Controller enumeration using a NULL session User credentials recovered from a share accesible with a NULL session Domain Controller enumeration using a domain account User credentials recovered from the description of an user of the domain User credentials recovered from a share accesible with a domain account Initial access to the machine with a domain account that belongs to the Remote Management Users group Privilege Escalation via a dump of the SAM database using a domain account with the SeBackupPrivilege privilege Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.209.245. ...

February 15, 2025 · 11 min

Hack The Box: Trickster

Description Trickster is a medium Hack The Box machine that features: Cross-Site-Scripting in PrestaShop application that leads into Remote Code Execution User Pivoting by recovering the password of the user from the PrestaShop MySQL database Docker internal application changedetection.io discovery and local port forwarding Remote Code Execution in changedetection.io Docker application Privilege Escalation via a password leak in the Bash History of the container Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.80.146. ...

February 1, 2025 · 9 min

Hack The Box: Strutted

Description Strutted is a medium Hack The Box machine that features: Image upload web application with Apache Struts vulnerable to Remote Command Execution User Pivoting by leaked credential in a configuration file Privilege Escalation by using tcpdump tool ran as root user Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.59. $ ping -c 3 10.10.11.59 PING 10.10.11.59 (10.10.11.59) 56(84) bytes of data. 64 bytes from 10.10.11.59: icmp_seq=1 ttl=63 time=44.1 ms 64 bytes from 10.10.11.59: icmp_seq=2 ttl=63 time=43.3 ms 64 bytes from 10.10.11.59: icmp_seq=3 ttl=63 time=43.5 ms --- 10.10.11.59 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2004ms rtt min/avg/max/mdev = 43.274/43.637/44.093/0.340 ms The machine is active and with the TTL that equals 63 (64 minus 1 jump) we can assure that it is an Unix machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

January 23, 2025 · 8 min

Hack The Box: MonitorsThree

Description MonitorsThree is a medium Hack The Box machine that features: SQL Injection in a web application to obtain user credentials Authenticated Remote Command Execution in Cacti web application Hash Cracking to obtain an user’s password, reused for a Linux user Local Port Forwarding to expose an internal Duplicati web application Privilege Escalation using Duplicati backup application having access to all the filesystem Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.216.196. ...

January 18, 2025 · 13 min

Hack The Box: Sightless

Description Sightless is an easy Hack The Box machine that features: Remote Command Execution in the SQLPad web application Escaping from Docker container by cracking the “shadow” hashes and logging through SSH Discovery of internal Froxlor web application and local port forwarding Password Recovery by using a debugging session of the Chrome browser Recovery of a KeePass database file password located in a FTPS service owned by Froxlor application Privilege Escalation by recovering the SSH login key from the KeePass database Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.172.196. ...

January 11, 2025 · 10 min

Hack The Box: Sea

Description Sea is an easy Hack The Box machine that features: Remote Command Execution via a Cross Site Scripting vulnerability in WonderCMS application Crack of a weak password hash that allows the login as a Linux user Privilege Escalation via a Command Injection in an internal HTTP monitoring application Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.214.57. ...

December 21, 2024 · 8 min

Hack The Box: Compiled

Description Compiled is a medium Hack The Box machine that features: Windows Git vulnerability allowing Remote Command Execution by cloning a repository Cracking the password hash of a Gitea user Password Reuse of the Gitea user password in a Windows Local Account Privilege Escalation via a Visual Studio 2019 vulnerability Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.91.211. ...

December 14, 2024 · 11 min

Hack The Box: GreenHorn

Description GreenHorn is an easy Hack The Box machine that features: Leaked CMS password hash in a Gitea server Crack of a weak password Vulnerable pluck web application that allows Arbitrary File Upload that leads in Remote Command Execution Reused CMS password in a Linux user Privilege Escalation via the recovery of the root’s password by depixelizing a pixelized image in a PDF file Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.242.145. ...

December 7, 2024 · 6 min

Hack The Box: Unrested

Description Unrested is a medium Hack The Box machine that features: Zabbix SQL Injection that leads into Remote Command Execution vulnerability Privilege Escalation via a restricted Nmap command script Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.50. $ ping -c 3 10.10.11.50 PING 10.10.11.50 (10.10.11.50) 56(84) bytes of data. 64 bytes from 10.10.11.50: icmp_seq=1 ttl=63 time=44.3 ms 64 bytes from 10.10.11.50: icmp_seq=2 ttl=63 time=43.3 ms 64 bytes from 10.10.11.50: icmp_seq=3 ttl=63 time=43.8 ms --- 10.10.11.50 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2003ms rtt min/avg/max/mdev = 43.288/43.796/44.292/0.409 ms The machine is active and with the TTL that equals 63 (64 minus 1 jump) we can assure that it is an Unix machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

December 5, 2024 · 8 min