๐ฆNocturnal
https://app.hackthebox.com/machines/Nocturnal

Recon
[*] Running initial Nmap scan...
sudo nmap -sCV -T4 10.10.11.64 -oA nmap-initial
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-03 18:59 CEST
Nmap scan report for nocturnal.htb (10.10.11.64)
Host is up (0.020s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 20:26:88:70:08:51:ee:de:3a:a6:20:41:87:96:25:17 (RSA)
| 256 4f:80:05:33:a6:d4:22:64:e9:ed:14:e3:12:bc:96:f1 (ECDSA)
|_ 256 d9:88:1f:68:43:8e:d4:2a:52:fc:f0:66:d4:b9:ee:6b (ED25519)
80/tcp open http nginx 1.18.0 (Ubuntu)
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Welcome to Nocturnal
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelWebsite

In the website we can register a User and upload some files.
Intercepting the request of viewing a file we detect possible entrypoint and send it to the repeater:
User
Adding an asterix to the query we try to get files from other users:

Starting the intruder with /seclists/Usernames/xato-net-10-million-usernames.txt we find some other user files. While grepping for "Available files for download" we find some users. Admin and tobias have no files but amanda got one interesting privacy.odt

We are login in using these credentials.

We can see some juice-files at the Admin-Panel:
Moreover we find a vulnerability when we test the creating backup function at the bottom.

After some testing we find a dump with hashes:
Throwing these hashes into a file and cracking them using crackstation:

We can login as tobias
Root
Beside the port 80 we know we find another websever running on port 8080
We gonna forward this via ssh
The password of tobias as admin does work here as well.

The the Help Panel we detect ISPConfig Version: 3.2.10p1
With that information we find the CVE-2023-468181
In case you havin trouble because of the missing crsf-cookie you can use this script, same usage.
Last updated