Box Info
  • Name:BoardLight
  • OS: Linux
  • Difficulty: Easy
  • IP: 10.10.11.11
BoardLight box image

Setup

mkdir -p ~/ctf/HackTheBox/boardlight/scans; cd ~/ctf/HackTheBox/boardlight IP Address: 10.10.11.11

echo "10.10.11.11 boardlight.htb" | sudo tee -a /etc/hosts 10.10.11.11 boardlight.htb


Enumeration

nmap -sC -sV -Pn -p- boardlight.htb -oN scans/nmap -vv nmap -sC -sV -p- -T5 --min-rate 2500 -oN scans/nmap_2 boardlight.htb

boardlight.htb didnt have any directory or subdomain so found this on home page : board.htb

Homepage:

Version was mentioned found a cve and exploit CVE-2023-30253

using hit and trial admin:admin worked

got reverse shell

using find . -name conf*

after logging in larissa account and running linpeas we found

quick google search returned a cve CVE-2022-37706 running this script in machine gave us root


user flag

Location: /home/larissa | Flag: ad4c##################################

after logging in larissa account and running linpeas we found quick google search returned a cve CVE-2022-37706

running this script in machine gave us root

root flag

Location: /root | Flag: a87##################################