<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>HTB-Machines on </title>
    <link>https://old.frang4.tech/tags/htb-machines/</link>
    <description>Recent content in HTB-Machines on </description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 20 Sep 2025 03:38:50 -0300</lastBuildDate>
    <atom:link href="https://old.frang4.tech/tags/htb-machines/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Fluffy - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/fluffy/writeup/</link>
      <pubDate>Sat, 20 Sep 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/fluffy/writeup/</guid>
      <description>&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We started by enumerating the provided credentials for the user &lt;code&gt;j.fleischman&lt;/code&gt; and identified an SMB share named &lt;code&gt;IT&lt;/code&gt;. After downloading files from the share, we discovered a PDF detailing vulnerabilities, including CVE-2025-24071, which enabled me to craft a malicious &lt;code&gt;.zip&lt;/code&gt; file to leak NTLM hashes via Windows Explorer&amp;rsquo;s automatic file parsing. Using this exploit, we captured the NTLM hash for the user &lt;code&gt;p.agila&lt;/code&gt; and cracked its password.&lt;/p&gt;&#xA;&lt;p&gt;With &lt;code&gt;p.agila&lt;/code&gt;&amp;rsquo;s credentials, we found that the user had &lt;code&gt;GenericAll&lt;/code&gt; permissions over the &lt;code&gt;SERVICE ACCOUNTS&lt;/code&gt; group. This allowed us to add &lt;code&gt;p.agila&lt;/code&gt; to the group and, subsequently, perform a Shadow Credentials attack to impersonate the &lt;code&gt;WINRM_SVC&lt;/code&gt; account, successfully gaining access to the system as that user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cypher - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/cypher/writeup/</link>
      <pubDate>Thu, 10 Jul 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/cypher/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Cypher&lt;/code&gt; is a Hack The Box machine released on 01 Mar 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Cypher is a HTB machine running a web app that relies on a Neo4j graph database. A &lt;code&gt;Cypher-injection&lt;/code&gt; flaw lets us bypass the login logic and enumerate data. Then, an exposed directory holds a JAR file whose decompiled code reveals a custom Neo4j procedure that executes shell commands without sanitisation (&lt;code&gt;command injection&lt;/code&gt;); exploiting that procedure yields remote code execution and a reverse shell.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Artificial - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/artificial/writeup/</link>
      <pubDate>Tue, 24 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/artificial/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Artificial&lt;/code&gt; is a Hack The Box machine from season 8&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Artificial is a machine with a web interface that allows to upload and execute TensorFlow .h5 model files. The initial foothold was obtained by embedding a reverse shell code inside a Lambda layer and exploiting the backend&amp;rsquo;s behavior which loads these models without sandboxing. From there, we accessed the Flask app&amp;rsquo;s source code, extracted database credentials, dumped the user table, cracked hashes using rockyou.txt, and obtained valid SSH credentials for user gael, leading to the user flag.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nocturnal - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/nocturnal/writeup/</link>
      <pubDate>Sat, 21 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/nocturnal/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Nocturnal&lt;/code&gt; is a Hack The Box machine released on 12 Apr 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Nocturnal is a Hack The Box machine which serves a web application that allows file upload and download. The interesting/weird thing is that it utilizes a &lt;code&gt;username&lt;/code&gt; parameter in the URL to retrieve and show files for an specific user. This is vulnerable to Insecure Direct Object Reference (IDOR) and also allowed us to enumerate users. Using &lt;code&gt;ffuf&lt;/code&gt; we found user &lt;code&gt;amanda&lt;/code&gt; and were able to read her files finding credentials.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Code - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/code/writeup/</link>
      <pubDate>Sat, 14 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/code/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Code&lt;/code&gt; is a Hack The Box machine released on 22 Mar 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We’re presented with a Python-based code editor exposed via a web application, allowing users to write, save, and execute Python scripts. However, execution is limited by a blacklist of restricted keywords, making direct command execution impossible at first glance. The first part of the challenge involves bypassing these restrictions to achieve Remote Code Execution (RCE).&lt;/p&gt;&#xA;&lt;p&gt;To do so, we leverage &lt;strong&gt;object-oriented introspection&lt;/strong&gt; to enumerate loaded Python subclasses and locate the index of the &lt;code&gt;sys&lt;/code&gt; module. With access to &lt;code&gt;sys.modules&lt;/code&gt;, we enumerate all loaded modules and identify one that exposes a &lt;code&gt;call&lt;/code&gt; function—specifically, &lt;code&gt;subprocess.call()&lt;/code&gt;—which enables us to execute system commands and obtain a reverse shell.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dog - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/dog/writeup/</link>
      <pubDate>Tue, 10 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/dog/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Dog&lt;/code&gt; is a Hack The Box machine released on 08 Mar 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Started by identifying the CMS version and other services running on the target, including &lt;code&gt;Backdrop CMS 1.27.1&lt;/code&gt;. Through endpoint enumeration and exploration of accessible files and directories, I discovered several opened directories, among them &lt;code&gt;.git&lt;/code&gt; which can be downloaded using &lt;code&gt;git-dumper&lt;/code&gt; to retrieve the source code of the applicaiton&lt;/p&gt;&#xA;&lt;p&gt;In the source code I found credentials for the database and some usernames. A lot of password reuse after I managed to access the admin panel using a combination of them. Once there, leveraged an exploit (CVE-2022-43422) to achieve remote code execution (RCE). From there, I established a web shell, which had a trick since it was getting deleted after a minute, so I modified the paylod to get a reverse shell as the &lt;code&gt;www-data&lt;/code&gt; user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Planning - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/planning/writeup/</link>
      <pubDate>Mon, 12 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/planning/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Planning&lt;/code&gt; is a Hack The Box machine released on 10 May 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Planning is a box with a huge fuzzing to do in order to find a Grafana instance, which was vulnerable to CVE-2024-9264, a critical vulnerability allowing arbitrary command execution via unsanitized SQL input to the DuckDB CLI. Using a proof-of-concept exploit, I was able to read files and execute commands, confirming access to the Grafana container but not the host system. Further enumeration revealed valid credentials for the user enzo, which allowed SSH access to the host system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Titanic - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/titanic/writeup/</link>
      <pubDate>Fri, 09 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/titanic/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Titanic&lt;/code&gt; is a Hack The Box machine released on 15 Feb 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Titanic is a web application with a Local File Inclusion (LFI) vulnerability, which allowed me to enumerate sensitive files, including the &lt;code&gt;/etc/hosts&lt;/code&gt; file that revealed a secondary host &lt;code&gt;dev.titanic.htb&lt;/code&gt;. This led to a Gitea instance where I found configuration files exposing the path to Gitea’s database. Using the LFI vulnerability, I downloaded the database, extracted password hashes for the &lt;code&gt;developer&lt;/code&gt; user, and cracked them to gain SSH access to the machine as &lt;code&gt;developer&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
