Reading Time: 2 min read
Start 17:50 10-07-2025
Scope:10.10.11.68
Creds:admin / 0D5oT70Fq13EvB5rsudo nmap -sC -sV -sT -vvvv -p- -T5 --min-rate=5000 -Pn planning.htb
PORT STATE SERVICE REASON VERSION22/tcp open ssh syn-ack OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 (Ubuntu Linux; protocol 2.0)80/tcp open http syn-ack nginx 1.24.0 (Ubuntu)| http-methods:|_ Supported Methods: GET HEAD POST|_http-title: Edukate - Online Education Website|_http-server-header: nginx/1.24.0 (Ubuntu)Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
No easy win.
80/TCP - HTTP
Section titled “80/TCP - HTTP”

I ran a gobuster scan:

I then tried creating wordlists out of the found instructors, hoping that I could brute force it with the provided password.

None of these matched however:

I then started enumerating vhosts using ffuf:

I went ahead and added it to my /etc/hosts:


I went ahead and input the creds and got in:

I then searched up whether there was any RCE exploit for the Grafana v11.0 version:



While this looked promising, I was not done yet.

By using the env command however I was able to find some juicy creds:


enzoRioTecRANDEntANT!Success!
Foothold
Section titled “Foothold”Shell as enzo
Section titled “Shell as enzo”
Time to get user.txt
user.txt
Section titled “user.txt”
I then tried an easy win but unfortunately it didn’t work:

Privilege Escalation
Section titled “Privilege Escalation”Enumeration
Section titled “Enumeration”I downloaded over linpeas.sh and started enumerating:

Well that sucks.


Let’s check the last one out.

Local Port Forward
Section titled “Local Port Forward”I use the following command on ssh to port forward so I can access the 8000 port.

I use the found creds:


And I’m in.
I create a new cron job:

I start a listener and click on Run now:

root.txt
Section titled “root.txt”

Finished 20:04 10-07-2025