Socket

Recon

nmap_scan.log

HTTP (80)

Application allows encoding and decoding QR codes.

Writeup.png

We can also make report, but nothing on XSS.

Writeup-1.png

We can also download the application for Linux or Windows

Decoding test.png gives kavigihan:

Nothing much so let's jump in the program itself.

The application does version check and updates, so it must be making requests somewhere. There's host ws://ws.qreader.htb:5789 and /version, /update endpoints.

Writeup-2.png
Writeup-3.png

Note: DNS is resolved to localhost so WE can catch them and inspect them.

mitmproxy seemed like a valid choice, but it wasn't able to resend/edit WebSocket communication. Turns out Burpsuite supports this and even more!

Writeup-4.png

SQLi in WebSockets

Writeup-5.png

https://exploit-notes.hdks.org/exploit/web/websocket-pentesting/arrow-up-right

Writeup-6.png
Writeup-7.png

Creds: admin:denjanjade122566

No pages on main website and SSH doesn't work.

Pending status is to Thomas Keller, which should be local user.

SSH (22)

Creds: tkeller:denjanjade122566

User.txt

Privilege Escalation

Priv esc is related to pyinstaller, first to get idea what we are working with let's generate it:

The pyinstaller is basically running python script with build command in script.

Root.txt

Last updated