Status: 🔒 Private – writeup will be published once the machine retires
Difficulty: Insane
Category: Linux | Web Exploitation | XML-RPC Abuse
Date Completed: 2025-08-10
What happens when a seemingly harmless game skin site hides an enterprise deployment tool behind closed doors?
Let’s just say… we found the keys to the castle – and the drawbridge was operated via XML-RPC.
From cracking questionable password choices to tunneling into forgotten services, this box rewards patient enumeration and a willingness to poke at dusty sysadmin tools.
ffuf or feroxbuster for web content discoverypython3 for custom XML-RPC interaction scriptsjohn for SHA-256 hash crackingssh -L for pivoting into internal servicescurl for quick XML-RPC testing/root/root.txt without ever popping a traditional root shell📸 Proof
