HTB - Brainfuck

Getting Root:
Nmap
Enumeration
HTTPS - Port 443
Got a few interesting things from the SSL Certificate:
email: orestis@brainfuck.htb
brainfuck.htb
sup3rs3cr3t.brainfuck.htb

These are possible virtual hosts

Dirsearch brainfuck.htb
WPScan
Users Found:
admin
administrator
Plugins:
WP Support Plus Responsive Ticket System Ver 7.1.3
Searchsploit
Using the privilege escalation POC, I made the following modification using information from previous enumeration.






https://10.10.10.17/8ba5aa10e915218697d1c658cdee0bb8/orestis/id_rsa

Cracking the id_rsa key passphrase
id_rsa key passphraseExploitation
Privilege Escalation
Root
Running this script gets the clear text which is the flag.
Last updated