HTB - Brainfuck

Brainfuck

Getting Root:

Nmap

Enumeration

HTTPS - Port 443

Got a few interesting things from the SSL Certificate: email: orestis@brainfuck.htb brainfuck.htb sup3rs3cr3t.brainfuck.htb

These are possible virtual hosts

Dirsearch brainfuck.htb

WPScan

Users Found: admin administrator Plugins: WP Support Plus Responsive Ticket System Ver 7.1.3

Searchsploit

Using the privilege escalation POC, I made the following modification using information from previous enumeration.

https://10.10.10.17/8ba5aa10e915218697d1c658cdee0bb8/orestis/id_rsa

Cracking the id_rsa key passphrase

Exploitation

Privilege Escalation

Root

Running this script gets the clear text which is the flag.

Last updated