Brainfuck

#insane #linux

https://app.hackthebox.com/machines/Brainfuckarrow-up-right


sudo nmap -sS -p- --min-rate 5000 -Pn -n -vv 10.129.228.97 -oA allPorts

https://brainfuck.htb/arrow-up-right

https://wpscan.com/vulnerability/b1808005-0809-4ac7-92c7-1f65e410ac4f/arrow-up-right

Descargar el exploit

Acceder a

file:///home/arch/htb/machines/brainfuck/wp_privesc.htmlarrow-up-right

Interceptar la request con Burpsuite

Una vez enviada la request se setean las cookies y se puede acceder como admin https://brainarrow-up-rightfuck.htb/arrow-up-right

view-source:https://brainfuck.htb/wp-admin/options-general.php?page=swpsmtp_settings

Iniciar sesión con las credenciales encontradas

https://sup3rs3cr3t.brainfuck.htb/arrow-up-right

https://sup3rs3cr3t.brainfuck.htb/d/2-ssh-accessarrow-up-right

https://sup3rs3cr3t.brainfuck.htb/d/3-keyarrow-up-right

Copiar la clave a un archivo

User flag

circle-check

https://crypto.stackexchange.com/questions/19444/rsa-given-q-p-and-e/19530#19530arrow-up-right

Root flag

circle-check

Last updated