Perfection

Recon

nmap_scan.log

HTTP (80)

Website allows us to calculate weights:Pasted_image_20240512203939.png

Headers:

The server seems to be running Ruby. If we try any symbols inside the fields we get Malicious character detected.

After playing around with parameter it seems like logic of code checks only first line with some kind of regex, injecting new line and SSTI payload shows result:Pasted_image_20240512204825.png

Reverse Shell

URL encode reverse shell and send:

User.txt

LinPeas

Pasted_image_20240512210332.png

Hmmm... I encountered database file but thought it wasn't crackable, so let's get to it!

Since the box has only 1 user Susan we don't need to crack all the hashes.

Using hashcat with attack mode 3arrow-up-right we can crack the hash easily without writing code and making it multithreaded/multiprocessed:

Root.txt

Last updated