Dog

Recon

nmap_scan.log

HTTP (80)

From about page we get 2 pieces of information: 1. Domain name, 2. CMS is Backdrop

Writeup.png

robots.txt discloses some potential paths

Git Dump

Nmap showed that .git was accessible so dump it

From blog we have a username: dogBackDropSystem

https://github.com/FisMatHack/BackDropScanarrow-up-right

Backdrop version is 1.27.1

Backdrop Authenticated RCE

Backdrop CMS 1.27.1 - Authenticated Remote Command Execution (RCE)arrow-up-right

Writeup-1.png

MySQL Creds: root:BackDropJ2024DS2024

dogBackDropSystem user didn't work. If we search for domain name inside project source we get a valid user.

Creds: tiffany:BackDropJ2024DS2024

Writeup-2.png

Web Shell

Above URL didn't work, but http://10.129.189.5/?q=admin/modules/installarrow-up-right worked

Writeup-3.png
Writeup-4.png

http://dog.htb/modules/shell/shell.php?cmd=idarrow-up-right

Writeup-5.png

Reverse Shell

Get reverse shell (because HTB deletes the modules every x minutes and webshell is unusable...)

No luck with hashes

SSH (22)

Password Reuse

Try password reuse:

Creds: johncusack:BackDropJ2024DS2024

User.txt

Privilege Escalation

In help menu we have eval

Root.txt

Last updated