HTB Blocky
Minecraft server enumeration, Java JAR plugin decompilation revealing hardcoded database credentials, and trivial root access via sudo su.
WordPress Enumeration and Exploitation
Privilege Escalation via SUID Binary
Begin with attaching IP address to domain:
nano /etc/hosts

Firstly, check 80,443,8080 ports + conduct automated reconnaissance

Looks like Wordpress frontend. On meta part and footer it is observable

Let’s conduct port scan & fuzzing respectively.
use both at the same time ->
sudo nmap -sV -sC blocky.htb

sudo nmap -sV -sC -T4 -p- blocky.htb
Faster results in 65535 ports

No meaningful services.

To dive into SMB shares I conducted enum4linux scan.

There were no juicy findings.
Fuzzing matters ,but let me initially give a chance to wpscan
Clear RCE vector plugin can be seen below

Checking fuzz results:
dirsearch -u blocky.htb -w /usr/share/wordlists/seclists/Discovery/Web-Content/raft-medium-directories.txt
Interesting path -> /plugins

Apply --enumerate u so as to identify current users available on application:
wpscan --url http://blocky.htb --enumerate u

Returning back to java files, I found a generic root:pass combination.

Upon that finding, I tried on SSH ,but still stucks. However, after a successful fuzzing operation, I saw phpmyadmin login.

Found user pass as hashed format.

Lets check via Crackstation
Could not determine

I used hashes.com to identify regarding hash type

Use hash-identifier "$P$BiVoTj899ItS1EZnMhqeqVbrZI4Oq0/"

Ready to brute via hashcat

hashcat -m 400 o.hash /usr/share/wordlists/sqlmap.txt
I was not successfuly. Instead, let me try to use password as SSH user notch

GFTObins perfectly fine actually or I will figure out through linpeas.
Understand what commands can notch run ->

ITS OK. Notch can run everything as Blocky (AKA ROOT) do.
sudo -u#-1 /bin/bash from HackTricks

I took root privileges as you can see above.
Find flags ->


May The Pentest Be With You ! ! !