[HTB] Headless

URLLink 🔗
LevelEasy
Attacker IP10.10.14.31
Target IP10.10.11.8

Intro

Today I am tackling the HackTheBox machine Headless. I will start with discovering a web server running on TCP/5000. Then I will uncover a Stored XSS. By exploiting this, I will exfiltrate the is_admin cookie, gaining access to the restricted endpoint, abuse a command injection within it to achieve RCE and establish a reverse shell. Ultimately, I will escalate privileges by exploiting a misconfigured script to obtain root access and pwn the target.

read more