โšœ๏ธEureka

https://app.hackthebox.com/machines/Eureka

Recon

Using the Scripts/Functions/Tools

Adding new hosts

Furni-Website

Leaking information because of misconfigured Spring Boot Acutators http://furni.htb/actuator/envarrow-up-right

Checking a common entry points list

We find a heapdump at http://furni.htb/actuator/heapdumparrow-up-right

Using a script with the help of chat-gpt we find a password:

User

We find another password in the application.yml of the eureka-server

nmap-full-scan

The full scan shows the other http-server eureka on port 8761 or like seen in the command above

Eureka-Server

Using these credentials we can login

Create new fake service using this Hacking Netlix Eurekaarrow-up-right as example

After some time we get the User and Password on our listener

Change the coding using cyberchefarrow-up-right we get the user-flag

Root

Checking for procs running with root privs show us a log_analyse.sh

Searching for log_analyse.sh

In that file at analyze_http_statuses() we can

Last updated