Setup
mkdir -p ~/ctf/HackTheBox/boardlight/scans; cd ~/ctf/HackTheBox/boardlight
IP Address: 10.10.11.11
echo "10.10.11.11 boardlight.htb" | sudo tee -a /etc/hosts
10.10.11.11 boardlight.htb
Enumeration
nmap -sC -sV -Pn -p- boardlight.htb -oN scans/nmap -vv
nmap -sC -sV -p- -T5 --min-rate 2500 -oN scans/nmap_2 boardlight.htb
boardlight.htb didnt have any directory or subdomain so found this on home page :
board.htb
Homepage:
Version was mentioned found a cve and exploit CVE-2023-30253
using hit and trial admin:admin worked
got reverse shell
using find . -name conf*
after logging in larissa account and running linpeas we found
quick google search returned a cve CVE-2022-37706
running this script in machine gave us root
user flag
Location: /home/larissa | Flag: ad4c##################################
after logging in larissa account and running linpeas we found
quick google search returned a cve CVE-2022-37706
running this script in machine gave us root
root flag
Location: /root | Flag: a87##################################