Titanic

Recon

nmap_scan.log

HTTP (80)

Only thing that works on website is Book Now

Writeup.png
Writeup-1.png

LFI

Writeup-2.png

We might be user developer since we can read the home files

Writeup-3.png

Server is apache and application is lives in /var/www/html

Writeup-4.png

Scratch that...

Writeup-5.png

Same config is inside /etc/apache2/sites-available/titanic.conf

../app.py to get app source code

/etc/hosts has another subdomain

Writeup-6.png

Dev Subdomain

Writeup-7.png

http://dev.titanic.htb/developer/flask-app/commit/f747049bc949526d9cd9bd45cfaeed6f6db92496arrow-up-righthttp://dev.titanic.htb/developer/flask-app/commit/699639b37d9542cc26c3707a9dd9194f1cba4696arrow-up-right

MySQL root password: MySQLP@$$w0rd!

Writeup-8.png

Gitea database can be dumped

Writeup-9.png

Convert to hashes

Crack developer password

SSH (22)

User.txt

Privilege Escalation

No sudo privs

Let this run to catch any cronjobs

We can't SSH into docker container without private key and 37409 is unknown service.

There's some kind of script in /opt/scripts used to identify metadata of images..

Yeap, it's cronjob

Arbitrary Code Execution in AppImage version ImageMagickarrow-up-right

Env variables don't exist so it will default to current directory which we can hijack

Root.txt

Last updated