โ๏ธEureka
https://app.hackthebox.com/machines/Eureka

Recon
Using the Scripts/Functions/Tools
Adding new hosts
Furni-Website

Leaking information because of misconfigured Spring Boot Acutators http://furni.htb/actuator/env
Checking a common entry points list
We find a heapdump at http://furni.htb/actuator/heapdump
Using a script with the help of chat-gpt we find a password:
User
We find another password in the application.yml of the eureka-server
nmap-full-scan
The full scan shows the other http-server eureka on port 8761 or like seen in the command above

Eureka-Server
Using these credentials we can login

Create new fake service using this Hacking Netlix Eureka as example
After some time we get the User and Password on our listener
Change the coding using cyberchef we get the user-flag
Root
Checking for procs running with root privs show us a log_analyse.sh
Searching for log_analyse.sh
In that file at analyze_http_statuses() we can
Last updated