Summary: Initial access to this machine was very easy thanks to a backdoor that the site mentioned. Researching the hackers handle reveals a Github page with a bunch of different php backdoors. Once initial access is obtained the user webadmin is able to run a sudo command as the sysadmin user, which gets us the … Continue reading HTB – Traceback
HTB – Monteverde
Summary: Achieving initial access on this machine was done by enumerating a list of users and using those same users as passwords for a bruteforce attack. I took advantage of a sloppy user configured as the typical “admin/admin”. Once access was gained an XML file was found with credentials for the user. From there the … Continue reading HTB – Monteverde
HTB – Resolute
Summary: This box was a Windows domain controller that had some relaxed permissions on SMB shares that allowed me to obtain my initial foothold on the machine. After gaining access I enumerated the system and found a user with elevated privileges who also inadvertently left their password in plain text in a transcript file. Once … Continue reading HTB – Resolute
HTB – Postman
This box had an interesting way of obtaining initial access by backing up the Redis config to a file. I was able to exploit this and upload/backup an ssh key I generated and add it to the "authorized_keys" on the target box. At that point user level access was obtained and the path to root was a simple exploit because the "Webmin" service was running as root.
