Soccer
World Cup Finals!
World Cup Finals!
Nmap scan:
We would need to add soccer.htb
to our /etc/hosts
file to browser on port 80.
The website is an average soccer related page.
Doing a directory enumeration with feroxbuster reveals a few extra directories:
We can head to the /tiny
endpoint to find another application running.
On this directory, H3K Tiny File Manager is running and requires credentials to log in:
When googling online for exploits, I found quite a few that lead to RCE using default admin credentials of admin:admin@123
, which worked when trying to login.
Here, we can confirm the version of the software running in the help page.
There was one exploit for this on Github with a script:
To exploit this manually, we just need to upload a PHP web shell to this machine. However, it seems that we need to redirect our files to another folder since the /var/www/html
folder was not writeable.
Anyways, I uploaded the script to the uploads
directory and it seems to work. I uploaded via URL by hosting the cmd.php
file on a Python HTTP Server.
From here, we can get RCE on the machine easily.
Then, we can use this to spawn a reverse shell.
We can find another user called player
.
When checking netstat
, we find that port 3000 has a service running on it.
/etc/hosts
file on the machine also presents another domain:
We can also check the nginx configuration files for this website:
The configuration files only tell me that this os some type of proxy..? Seeing that there's a Connection 'upgrade'
bit, this service is definitely some type of WebSocket that is running on the machine.
We can proceed with enumeration of this host.