[HTB] Vault

Foothold discovery

  1. Attacker discover the 80 port during the nmap scan:

nmap -p- -sV 10.129.87.172
  1. Attacker enter the :80 port

  1. Attacker discovers the /sparklays endpoint based on the information that the page contains

  1. Since the access is forbidden attacker decide to enumerate the enpoint in order to find out if some endpoints are accessible to unauthorized user

File enumeration:

Discovered endpoints:

/login.php /admin.php

Folder enumeration:

Discovered folders:

/design

File enumeration inside found folder:

Discovered endpoints:

/design/changelogo.php

Folder enumeration inside found folder:

Discovered folders:

/design/uploads

  1. Attacker go to discovered /design/changelogo.php endpoint.

  1. Attacker upload the webshell with extension validation bypass (file with .php5 extension instead of .php)

  1. Attacker enter the uploaded webshell

Foothold flow

  1. Attacker upload the webshell with .php5 extension

  2. Attacker enter the webshell

Exploit written by me:

Last updated