Author: AMD

This is a writeup for Nocturnal machine.
My target IP: 10.10.11.64
NMAP
Lets scan out target.

CURL

Add “10.10.11.64 nocturnal.htb” to /etc/hosts
GOBUSTER

we can not access these urls
WEBSITE INSPECTION

First register then login
TEST FILE UPLOAD
Test file upload with .php file
See the valid file types
Upload valid file and see the link

FIND OTHER USERS
Lets try to find the other users and use the file link to access other users files.
use https://github.com/C0euss/Nocturnal-Username-Enumeration/tree/main to find other usernames

GUESS FILE NAMES

http://nocturnal.htb/view.php?username=amanda&file=privacy.odt
VIEW FILE

login with amanda and password
VIEW PAGES

go to admin panel

VIEW LOGIN.PHP

Get db information
RCE
Enter “dummy” to create backup password field, catch the request with burpsuite and send it to repeater.
url CyberChef to url encode

send with repeater

SSH
Crack tobias’s password using https://crackstation.net/

connect with ssh

GET USER FLAG

NETSTAT
Use netstat to use what is working on the machine

PF
We cannot visit http://127.0.0.1:8080 so lets try port forwarding


Lets visit http://127.0.0.1:8080

LOGIN
Lets try to login with tobias’s credentials ⇒ doesnt work
Lets try other usernames we found (amanda, admin) ⇒ admin works

EXEMINE SITE

Lets find vulnerability for this version ISPConfig


EXPLOIT VULNURABILITY
run “nano CVE-2023-46818.py” ⇒ paste the code ⇒ save and exit

GET ROOT FLAG
