โšœ๏ธEureka

https://app.hackthebox.com/machines/Eureka

Recon

Using the Scripts/Functions/Tools

Adding new hosts

Furni-Website

Leaking information because of misconfigured Spring Boot Acutators http://furni.htb/actuator/env

Checking a common entry points list

We find a heapdump at http://furni.htb/actuator/heapdump

Using a script with the help of chat-gpt we find a password:

User

We find another password in the application.yml of the eureka-server

nmap-full-scan

The full scan shows the other http-server eureka on port 8761 or like seen in the command above

Eureka-Server

Using these credentials we can login

Create new fake service using this Hacking Netlix Eureka as example

After some time we get the User and Password on our listener

Change the coding using cyberchef we get the user-flag

Root

Checking for procs running with root privs show us a log_analyse.sh

Searching for log_analyse.sh

In that file at analyze_http_statuses() we can

Last updated