Post

HackTheBox_Beep | w/o Metasploit

HTB - Beep

Nmap Scan

Overview

The “Beep” machine is an easy-level HackTheBox challenge designed to test your skills in basic enumeration and exploitation. The machine features a vulnerable web application that can be exploited to gain access.

Enumeration

Nmap Scan Results

Nmap Scan

Nmap Results

Access Issues

Unable to access the page initially:

Access Issues

We resolved this by changing the minimum TLS settings in about:config:

Change TLS Settings

Now we can view the homepage:

Homepage

Vulnerabilities

Elastix Local File Inclusion (LFI) Vulnerability

Reference: Exploit-DB

What is LFI?

Local File Inclusion (LFI) allows an attacker to trick a web application into exposing or executing files on the web server. This may lead to information disclosure, remote code execution, or Cross-site Scripting (XSS). Typically, LFI occurs when an application uses a file path as input without proper validation, allowing an attacker to include local files in the application.

LFI is similar to Remote File Inclusion (RFI), but RFI allows inclusion of remote files, while LFI is limited to local files.

Directory Traversal

An LFI vulnerability can also lead to Directory Traversal, allowing attackers to access sensitive files by manipulating file paths:

1
http://example.com/?file=../../../../etc/passwd

This can expose sensitive information such as user lists or log files, which can be used to further an attack.

Exploitation

We exploited the LFI vulnerability to perform a directory traversal:

Homepage

The traversal was successful, revealing useful information:

Homepage Homepage Homepage

Using these credentials, we accessed the machine via SSH:

Homepage

We then located the flags:

Root Flag

Homepage

User Flag

Homepage

Pwned

This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.