HTB Blocky

HTB Blocky

Begin with attaching IP address to domain:

nano /etc/hosts

Firstly, check 80,443,8080 ports + conduct automated reconnaissance

Looks like Wordpress frontend. On meta part and footer it is observable

Let’s conduct port scan & fuzzing respectively.

use both at the same time ->

sudo nmap -sV -sC blocky.htb

sudo nmap -sV -sC -T4 -p- blocky.htb

Faster results in 65535 ports

No meaningful services.

To dive into SMB shares I conducted enum4linux scan.

There were no juicy findings.

Fuzzing matters ,but let me initially give a chance to wpscan

Clear RCE vector plugin can be seen below

Checking fuzz results:

dirsearch -u blocky.htb -w /usr/share/wordlists/seclists/Discovery/Web-Content/raft-medium-directories.txt

Interesting path -> /plugins

Apply --enumerate u so as to identify current users available on application:

wpscan --url http://blocky.htb --enumerate u

Returning back to java files, I found a generic root:pass combination.

Upon that finding, I tried on SSH ,but still stucks. However, after a successful fuzzing operation, I saw phpmyadmin login.

Found user pass as hashed format.

Lets check via Crackstation

Could not determine

I used hashes.com to identify regarding hash type

Use hash-identifier "$P$BiVoTj899ItS1EZnMhqeqVbrZI4Oq0/"

Ready to brute via hashcat

hashcat -m 400 o.hash /usr/share/wordlists/sqlmap.txt

I was not successfuly. Instead, let me try to use password as SSH user notch

GFTObins perfectly fine actually or I will figure out through linpeas.

Understand what commands can notch run ->

ITS OK. Notch can run everything as Blocky (AKA ROOT) do.

sudo -u#-1 /bin/bash from HackTricks

I took root privileges as you can see above.

Find flags ->

May The Pentest Be With You ! ! !

Read more