Jump to content

Featured Replies

Posted

Hack The Box - Delivery

20210322162559.png-water_print

信息收集

1

nmap -T4 -A 10.10.10.222

20210322162656.png-water_print

The target machine opens ports 22, 80, etc.

To access port 80, click CONTACT US:

20210322162826.png-water_print

Two domain names were found on this page: helpdesk.delivery.htb and delivery.htb

Add the above two domain names to the hosts file and perform the next test.

Create a new work order on

漏洞利用

http://helpdesk.delivery.htb/index.php:

20210322163236.png-water_print

20210322163409.png-water_print

Get an email and ticket ID.

Using this email address, register an account at http://delivery.htb:8065/signup_email:

20210322163642.png-water_print

After creating an account, I found that email verification is required, but I cannot obtain the link to register and authenticate at present.

There is a link to view historical tickets on helpdesk.delivery.htb and then view details in Check Ticket Status:

20210322163817.png-water_print

I found that the authentication link was sent here, click the link, confirm the account, and log in to the background:

20210322163908.png-water_print

Discover the Server's username and password in the background maildeliver:Youve_G0t_Mail! and the password rule left by the administrator: PleaseSubscribe!

SSH Login:

20210322164152.png-water_print

Get user's flag.

Find the application's config file under /opt/mattermost/config/:

20210322164325.png-water_print

Find the username and password of mysql in the file:

20210322164410.png-water_print

Log in to mysql and find sensitive information:

20210322164608.png-water_print

Discover the password hash of the root user in the web application, guessing that there is password reuse, combined with the clues of password structure left in the previous work ticket system, use hashcat to crack the password, and get the clear text of the password as: PleaseSubscribe!21

SU switch user:

20210322164824.png-water_print

Get the root user's flag.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.