Skip to content

Latest commit

 

History

History
60 lines (39 loc) · 4.41 KB

File metadata and controls

60 lines (39 loc) · 4.41 KB

🔓 Soulmate (HTB) — Writeup

First we qill begin nmap 🔍
Screenshot 2025-09-13 044617

we got ssh adn http and epmd — lets enumerate subdomains now 🌐🔎
Screenshot 2025-09-13 060521

nice we got ftp — lets see it on the web site 📁🌍
Screenshot 2025-09-13 073135

as we can see it is CrushFTP — we will google it and found this PoC to add user and login (used): 🛠️
https://github.com/Immersive-Labs-Sec/CVE-2025-31161
Screenshot 2025-09-13 064617

now after adding user lets login 🔐✅
Screenshot 2025-09-13 064436

okay lets analyze the web and see 🧐
Screenshot 2025-09-13 064654

okay we can change password of users and login — lets try ben 🔁🔑
Screenshot 2025-09-13 064721

okay now we can see this is pages that was on soulmate.htb so lets try to upload malicious file.php 💣📤
Screenshot 2025-09-13 064935

Screenshot 2025-09-13 064956

okay lets try to execute it now ▶️
Screenshot 2025-09-13 065023

Boom we got it 🎉💥
Screenshot 2025-09-13 065040

now lets run linpeas and enumerate for creds / priv esc vectors 🧰🔎
Screenshot 2025-09-13 070333

we got this — lets try to see this file content, maybe it has ben password 📂🔑
Screenshot 2025-09-13 070727

and yes we got it — lets go get our user flag now 🏁🧾
Screenshot 2025-09-13 070756

after this we can see also port 2222 open locally (ssh) and it can be related to the EPMD we found in the nmap 🔁🔐
Screenshot 2025-09-13 072558

so lets try to connect with ben credentials to the local ssh on 2222 — attempt successful 🖥️➡️🔒
Screenshot 2025-09-13 072025

okay now we can see we are root 👑✅
Screenshot 2025-09-13 072101

okay now lets try to drop root shell on our attack IP (reverse shell) 🎯🔙
Screenshot 2025-09-13 072215

Boom — go get your flag hacker 🏴‍☠️🚩
Screenshot 2025-09-13 072930