🛑
This box is still active on HackTheBox. Once retired, this article will be published for public access as per HackTheBox's policy on publishing content from their platform.
Clicking the Subscribe button below WILL NOT get you access to this article (although I would be grateful for your subscription otherwise).
Clicking the Subscribe button below WILL NOT get you access to this article (although I would be grateful for your subscription otherwise).
Initial Foothold Hint:
- Did you enumerate the directories and files on the web server?
- Can you find any CVEs for the installed product?
Privilege Escalation Hint:
- The vulnerable service is Dockerized, can you find any interesting Docker files?
- There's a hash in the file, but this is just a placeholder value
- Does Docker leave any log files where that hash might be written?
- How is the hash value calculated?
- What kind of hash is it and how do you crack it?