Skip to content

Latest commit

 

History

History
58 lines (36 loc) · 1.96 KB

HTB-Optimum Machine.md

File metadata and controls

58 lines (36 loc) · 1.96 KB

#cybersecurity #hacking #penetration-testing #hack-the-box #metasploit #privilege-escalation #port80

Optimum Machine

NMAP Results

Enumeration

Port 80 was open so we go to the IP address to see what web content is being served. We see the same HttpFileServer 2.3 here. We could google this or just check metasploit.

Metasploit

Find exploit for HttpFileServer 2.3

Configure the Options

There's a Difference in Architecture between the box and our meterpreter session

But that doesn't seem to affect our exploitation

Possible because Metasploit is auto-detecting the target

Privilege Escalation

I background the first meterpreter session and search for suggested post-breach exploits The only option that needs to be configured here is the session If sessions aren't know you can just run show sessions

Once the suggester runs, I find what I'm really looking for which is a way to ==privilege escalate== from the "Kostas" user to the system authority/root

We get system authority from the exploit

Manual Exploitation

Work thru this again without metasploit.

To Reference Later

<iframe width="560" height="315" src="https://www.youtube.com/embed/kWTnVBIpNsE" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe> <iframe width="560" height="315" src="https://www.youtube.com/embed/bTxnobhJ_b8" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>