Q's blog

Home About me

Hackthebox - Blocky Writeup

A straightforward easy box on Hackthebox by enumerating wordpress site. Reversing a jar file and misconfiguration on sudo. As usual you should start on scanning the target.

nmap-result

Do your usual content enumeration in this case I use gobuster*. I notice that the webserver is running wordpress site.

enum-webserver

Run a wpscan* scan, try to enumerate everything. The following is an interesting finding that will be relevant to next exploitation process which is username notch.

username-notch

Exploring the result of content enumerations we found multiple unusual plugins with jar extension.

multiple-jars

Reversing jar files using jadx-gui* we found some interesting strings.

reverse-jars
Credential Found:
notch:8YsqfCTnvxAUeduziJNSXe22

Use the credential to access shell via SSH. Funnily enough the server is misconfigured to allow NO PASSWORD sudo* as Notch. Free root boys.

reverse-jars
  1. Gobuster
  2. WPScan
  3. Sudo nopasswd