[HTB] Vault
Foothold discovery
Attacker discover the 80 port during the nmap scan:
nmap -p- -sV 10.129.87.172
Attacker enter the :80 port

Attacker discovers the /sparklays endpoint based on the information that the page contains

Since the access is forbidden attacker decide to enumerate the enpoint in order to find out if some endpoints are accessible to unauthorized user
File enumeration:
Discovered endpoints:
/login.php /admin.php
Folder enumeration:
Discovered folders:
/design
File enumeration inside found folder:
Discovered endpoints:
/design/changelogo.php
Folder enumeration inside found folder:
Discovered folders:
/design/uploads
Attacker go to discovered /design/changelogo.php endpoint.

Attacker upload the webshell with extension validation bypass (file with .php5 extension instead of .php)

Attacker enter the uploaded webshell

Foothold flow
Attacker enter the http://<IP>/sparklays/design/changelogo.php subpage
Attacker upload the webshell with .php5 extension
Attacker enter the webshell
Exploit written by me:
Last updated