Reading Time: 2 min read
Start 17:50 10-07-2025
Scope:10.10.11.68
Creds:admin / 0D5oT70Fq13EvB5r
sudo nmap -sC -sV -sT -vvvv -p- -T5 --min-rate=5000 -Pn planning.htb
PORT STATE SERVICE REASON VERSION22/tcp open ssh syn-ack OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 (Ubuntu Linux; protocol 2.0)80/tcp open http syn-ack nginx 1.24.0 (Ubuntu)| http-methods:|_ Supported Methods: GET HEAD POST|_http-title: Edukate - Online Education Website|_http-server-header: nginx/1.24.0 (Ubuntu)Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
No easy win.
80/TCP - HTTP
Section titled “80/TCP - HTTP”I ran a gobuster
scan:
I then tried creating wordlists out of the found instructors, hoping that I could brute force it with the provided password.
None of these matched however:
I then started enumerating vhosts
using ffuf
:
I went ahead and added it to my /etc/hosts
:
I went ahead and input the creds and got in:
I then searched up whether there was any RCE exploit for the Grafana v11.0 version:
While this looked promising, I was not done yet.
By using the env
command however I was able to find some juicy creds:
enzoRioTecRANDEntANT!
Success!
Foothold
Section titled “Foothold”Shell as enzo
Section titled “Shell as enzo”Time to get user.txt
user.txt
Section titled “user.txt”I then tried an easy win but unfortunately it didn’t work:
Privilege Escalation
Section titled “Privilege Escalation”Enumeration
Section titled “Enumeration”I downloaded over linpeas.sh
and started enumerating:
Well that sucks.
Let’s check the last one out.
Local Port Forward
Section titled “Local Port Forward”I use the following command on ssh
to port forward so I can access the 8000
port.
I use the found creds:
And I’m in.
I create a new cron job:
I start a listener and click on Run now:
root.txt
Section titled “root.txt”Finished 20:04 10-07-2025