๐ŸฆNocturnal

https://app.hackthebox.com/machines/Nocturnal

Recon

[*] Running initial Nmap scan...
sudo nmap -sCV -T4 10.10.11.64 -oA nmap-initial
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-03 18:59 CEST
Nmap scan report for nocturnal.htb (10.10.11.64)
Host is up (0.020s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 20:26:88:70:08:51:ee:de:3a:a6:20:41:87:96:25:17 (RSA)
|   256 4f:80:05:33:a6:d4:22:64:e9:ed:14:e3:12:bc:96:f1 (ECDSA)
|_  256 d9:88:1f:68:43:8e:d4:2a:52:fc:f0:66:d4:b9:ee:6b (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
|_      httponly flag not set
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Welcome to Nocturnal
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Website

In the website we can register a User and upload some files.

Intercepting the request of viewing a file we detect possible entrypoint and send it to the repeater:

User

Adding an asterix to the query we try to get files from other users:

Starting the intruder with /seclists/Usernames/xato-net-10-million-usernames.txt we find some other user files. While grepping for "Available files for download" we find some users. Admin and tobias have no files but amanda got one interesting privacy.odt

We are login in using these credentials.

We can see some juice-files at the Admin-Panel:

Moreover we find a vulnerability when we test the creating backup function at the bottom.

After some testing we find a dump with hashes:

Throwing these hashes into a file and cracking them using crackstation:

We can login as tobias

Root

Beside the port 80 we know we find another websever running on port 8080

We gonna forward this via ssh

The password of tobias as admin does work here as well.

The the Help Panel we detect ISPConfig Version: 3.2.10p1

With that information we find the CVE-2023-468181

In case you havin trouble because of the missing crsf-cookie you can use this script, same usage.

Last updated