Alert
Writeup of Alert machine
Last updated
Writeup of Alert machine
Last updated
These steps aid in mapping network topology and assessing security. The picture shows the machine has two open ports. 80 & 22.
Port 80: This port is commonly used for HTTP (Hypertext Transfer Protocol) traffic, which forms the foundation of the web. It is the default port for web servers to accept requests from web browsers over an unencrypted connection.
Port 22: Known as the default port for SSH (Secure Shell), it allows secure management and data transfer over unsecured networks. SSH is commonly used for remote server management and secure file transfers.
http://statistics.alert.htb -> Asked Username & Password
http://alert.htb -> Output below
Hosting a Malicious Server
Malicious Markdown File (MD File)
The application's LFI vulnerability was exploited when this file was uploaded in order to get private files and send their contents to my Python server. I received the vulnerable 'filepath'.
So, the encrypted password of the user will be:
1600
Apache $apr1$ MD5, md5apr1, MD5 (APR)
BOOM!!!
Go login as a user and read the user.txt file.
Privilege Escalation
Open port: 8080
Testing the open port locally using ssh
The most interesting part is that the /opt directory has root permissions, providing a great opportunity to upload our shell and execute it from the browser.
Through analysis, it is clear that the page accepts a markdown (.md) file as input and visualizes. After doing some tests on Burpsuite, I suspected the and decided to try.
Our payload will look like
To get the password of user, I accessed the vulnerable file from statistics subdomain, where it was initially asking user's username and password.
Put it on the CyberChef and decode it by URL Decoding Recipe :
In order decrypt the password, we need to identify the type of hash. Here, I used and got it
Since hashcat requires quite huge amount of memory, you can use .
The End!!!
Thank you!!!