πŸ“…WingData

https://app.hackthebox.com/machines/WingData

WingData - HackTheBox Writeup


Reconnaissance

Nmap Scan

Open ports discovered:

  • 22/tcp -- SSH (OpenSSH 9.2p1 Debian)

  • 80/tcp -- HTTP (Apache 2.4.66)

The web server redirects to:

Add to /etc/hosts:


Web Enumeration

Browsing the site reveals a Client Portal:

Subdomain discovery:

Discovered:

Add to hosts:

The portal reveals:


Initial Access -- Exploiting Wing FTP RCE

The version is vulnerable to:

CVE-2025-47812 -- Wing FTP Server Remote Code Execution

Using public PoC:

Confirmed command execution.

Reverse Shell

Start listener:

Trigger shell:

Shell received as:


Upgrading the Shell

Stabilize the shell:

Now fully interactive.


Credential Extraction

Inspect Wing FTP configuration:

Relevant entries:

Check user file:

Extracted hash:

Format determined as:

Prepare hash for cracking:

Crack with hashcat:

Recovered password:


User Shell

Switch user:

Retrieve user flag:


Privilege Escalation

Check sudo permissions:

Found:

The script extracts tar archives using:

This is vulnerable to a tar link-resolution bypass.


Create exploit script:

Run exploit:

Verify escalation:

Now:

Gain root:


Final Flags

User flag: /home/wacky/user.txt Root flag: /root/root.txt


Summary

  1. Enumerated subdomain β†’ found Wing FTP portal\

  2. Exploited CVE-2025-47812 for RCE\

  3. Extracted salted SHA256 password hash\

  4. Cracked user credentials\

  5. Abused tarfile extraction vulnerability for root\

  6. Full system compromise


Last updated