htb outbound

初步枚举

nmap 10.10.11.79 -sV            
Starting Nmap 7.95 ( https://nmap.org ) at 2025-11-26 04:01 EST
Nmap scan report for era.htb (10.10.11.79)
Host is up (5.7s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.5
80/tcp open  http    nginx 1.18.0 (Ubuntu)
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 36.89 seconds

攻击链路

攻击Web应用程序(CVE-2025-49113)-->得到Docker环境shell-->升级shell-->查看config配置-->登录数据库-->查看user和session表-->破解密码-->使用该账户登录到Web-->得到ssh密码-->进入ssh后查看sudo命令-->得到below(CVE-2025-27591)

htb outbound

Initial Enumeration

nmap 10.10.11.79 -sV
Starting Nmap 7.95 (https://nmap.org) at 2025-11-26 04:01 EST
Nmap scan report for era.htb (10.10.11.79)
Host is up (5.7s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.5
80/tcp open  http    nginx 1.18.0 (Ubuntu)
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 36.89 seconds

Attack Chain

Attack the web application (CVE-2025-49113) --> Obtain a Docker environment shell --> Upgrade the shell --> View the configuration files --> Log in to the database --> Check the user and session tables --> Crack the passwords --> Use the account to log in to the web application --> Obtain the SSH password --> After gaining SSH access, view the sudo commands --> Discover the vulnerability (CVE-2025-27591)