HackTheBox - Blocky

The STTY command I messed up was simply `stty rows ## cols ##` 01:15 - Begin Recon with Reconnoitre 03:15 - Examining findings from Reconnoitre 06:50 - Decompiling java Jar Files with JAD 08:18 - Using JD-GUI 10:33 - Running WPScan 12:10 - Manually enumerating wordpress users 12:43 - SSH To the box and PrivEsc ------ Box Completed, Below extra content (Some mistakes, pretty much do this live without prep) 15:30 - Rabbit hole, gaining access through FTP 17:09 - Finding Wordpress DB Password 18:33 - Switching to WWW-DATA by using phpMyAdmin Wordpress 20:10 - Generating a PHP Password for Wordpress 21:50 - Gaining code execution with Wordpress Admin access 25:40 - Shell as www-data 26:40 - Enumerating Kernel Exploits with Linux-Exploit-Suggester 30:10 - Attempting CVE-2017-6074 Dccp Kernel Exploit (Unstable AF)
Back to Top