Traceback is an easy linux box released back in march 2020.
As always we begin our Enumeration using Nmap to enumerate opened ports. We will be using the flags -sC for default scripts and -sV to enumerate versions.
[ 10.10.14.13/23 ] [ /dev/pts/6 ] [~/HTB/Traceback]
→ nmap -vvv -p- 10.10.10.181 --max-retries 0 -Pn --min-rate=500 2>/dev/null | grep Discovered
Discovered open port 80/tcp on 10.10.10.181
Discovered open port 22/tcp on 10.10.10.181
[ 10.10.14.13/23 ] [ /dev/pts/7 ] [~/HTB/Traceback]
→ nmap -sCV -p80,22 10.10.10.181
Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-28 22:24 CEST
Nmap scan report for 10.10.10.181
Host is up (0.033s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 96:25:51:8e:6c:83:07:48:ce:11:4b:1f:e5:6d:8a:28 (RSA)
| 256 54:bd:46:71:14:bd:b2:42:a1:b6:b0:2d:94:14:3b:0d (ECDSA)
|_ 256 4d:c3:f8:52:b8:85:ec:9c:3e:4d:57:2c:4a:82:fd:86 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Help us
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.07 seconds
Our nmap scan picked up port 80, so let's investigate it:
[ 10.10.14.13/23 ] [ /dev/pts/6 ] [~/HTB/Traceback]
→ gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -t 50 -u http://10.10.10.181/
We can run a gobuster scan but it doesn't help us, so let's investigate further:
[ 10.10.14.13/23 ] [ /dev/pts/6 ] [~/HTB/Traceback]
→ curl 10.10.10.181
This site has been owned
I have left a backdoor for all the net. FREE INTERNETZZZ
- Xh4H -
<!--Some of the best web shells that you might need ;)-->