Sea

Steps

  • nmap scan
    • port 22 ssh
    • port 80 web
  • web enum
    • contact page -> robots page
    • figuring out server software -> file name points to WonderCMS
    • figuring out software version
    • searching the cve -> CVE-2023-41425
  • post exploit
    • interesting files -> database.js
    • crack the hash
    • lateral to amay user
    • port forwarding -> web servers on 56903 and 8080
    • port 8080 has a vulnerable log reader, shell injection to root

Resources used

https://benheater.com/hackthebox-sea/ https://nvd.nist.gov/vuln/detail/CVE-2023-41425 https://github.com/insomnia-jacob/CVE-2023-41425

Walkthough used

https://www.youtube.com/watch?v=eXTQ3z7esjQ


Written By

GitHub Contributor Team