Hackthebox - Curling
Contents
From nmap, there are ssh and http service.

This is the web page, it shows Cewl, which is a hint.

From gobuster, we found a secret.txt, it’s base64 encoded from Curling2018!.

And there is a /administrator/ login page.

I use cewl -w cewl.out http://10.10.10.150/ to create a wordlist, and using wfuzz to find the username with password Curling2018!. We got Floris.

Now, we can login to the Control Panel.

Go to Extentions -> Templates, and choose either one.


Create a new file reverse.php and paste our reverse shell payload.

We can access the php reverse shell.

We get a reverse shell as www-data.

We cannot access user.txt, but we found password_backup at Floris’s directory.

I use CyberChef to decompress it, and get file password.txt.

Now I am Floris. There is a directory /admin_area/, and a file input contains url.

The file report is the web page.

I revise input to file:///root/root.txt, and watch report.

We get the flag.

Author L3o
LastMod 2020-05-19