Skip to content

Latest commit

 

History

History
executable file
·
69 lines (38 loc) · 1.88 KB

README.md

File metadata and controls

executable file
·
69 lines (38 loc) · 1.88 KB

Devvortex - HTB


Scanning and Enumeration

  • Running nmap scans

    Nmap Results

  • Found a subdomain

    subdomain results

  • Navigated to dev.devvortex.htb and tried robots.txt

    Robots.txt

  • Found a login screen at /administrator

    Joomla login

  • Ran joomscan against this to find more information

    joomscan results

  • From here found Joomla version 4.2.6 among other things


Research


Initial Access

  • Ran the exploit against http://dev.devvortex.htb

    Exploit

  • These credentials allowed me to login to the joomla admin page

    Joomla admin

  • Right off the bat we see this is running PHP so let's try to find where we can run some php code to get a shell


Privilege Escalation

  • Logged into the local joomla db using the credentials found for lewis

    Database search

  • Navigated to joomla database and found the table sd4fg_users. In there I found some hashes for logan

    Logan hashes

  • Ran this through john the ripper and got a password

  • Using those credentials, I was able to login as logan

  • Found the user.txt

  • Ran sudo -l and found that logan can run apport-cli

  • Did some investigation and found a PoC for this privilege escalation (linked in resources)

    apport-cli