LinkVortex Write-Up - HTB

Recon

Starting off with nmap:

PORTS=$(grep "open" all_syn.txt | awk -F'/' '{print $1}' | tr '\n' ',' | sed 's/,$//'); sudo nmap -sVC -p $PORTS -Pn -n 10.10.11.47
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 3e:f8:b9:68:c8:eb:57:0f:cb:0b:47:b9:86:50:83:eb (ECDSA)
|_  256 a2:ea:6e:e1:b6:d7:e7:c5:86:69:ce:ba:05:9e:38:13 (ED25519)
80/tcp open  http    Apache httpd
|_http-server-header: Apache
|_http-title: Did not follow redirect to http://linkvortex.htb/
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Navigated to the webapp, didn't find anything special.

Running directory and vhost scanning:

VHOST:

Directory:

Nothing special neither...

So I quickly check the source of the page:

BruteForcing:

Found admin portal:

Great finding:

SQLi:

And trying SQLi:

I tried brute-forcing with custom CeWL list and SQLmap, but I get blacklisted.

I started inspecting the source files and the API endpoints of Ghost CMS better...

That's the key for the content api, though we can't access the admin api with it..

Going back...:

I must do something wrong. I went back and realized I fkd the vhost command, I added --append-domain now and found:

Ran some sub-directory brute-forcing, and found:

Used git-dumper to dump it.

There are quite some files inside:

Let's do some credential hunting:

Many files! Let's use AI, so I will:

And feed the enormous output to AI.

Foothold

Found a match - admin@linkvortex.htb:OctopiFociPilfer45

Honestly, this is the worst box ever! It's super random, feels like there is no intended path. Even this password is in a "test" folder.

Using: https://github.com/godylockz/CVE-2023-40028/tree/mainarrow-up-right

It seems that we are running in a docker container...

We got the creds:

PrivEsc

Super basic. We will nest 2 symlinks...

Not so cool box, but nice enumeration.

Last updated