Hackthebox - FriendZone
Contents
From nmap, there are many service opened.

I check smb first, and get creds.txt.


This is the web page, and there is a domain friendzoneportal.red.

From its certificate, we can see another domain friendzone.red.

With zone transfer, we can get many domains. I put them in /etc/hosts.


In administrator1, there is a login portal. I successfully login with creds.txt.


It seems like it can show photos if we provide the parameters.

Yes it does.

There is a LFI, so I use php filter to get the resource of timestamp. It’s a php file.


Later, I found that there is a smb share Development containing nothing, and we have read write permission to it. For testing, I upload a test.php, and get it from /etc/Development/test with LFI.


So, I create a reverse shell php script, and upload it. Access it, and I get a reverse shell as www-data.



From /var/www/mysql_data.conf, I get the credential for mysql.

I successfully ssh as friend with this credential.

From pspy64, we can see that root execute /opt/server_admin/reporter.py as cronjob.

I don’t have the permission to edit it, but I can get its content. It imports os, and it is running with python 2.7.

I found that we can edit os.py. I add a python reverse shell script at the end of os.py so everytime it is imported, we can get a reverse shell.


A minute later, I get the reverse shell as root.

Author L3o
LastMod 2020-05-28