Feline — HTB walkthrough

Source Code Enumeration
https://github.com/frohoff/ysoserial
First upload a file named iamfedup.session which contains command to change the mode to 777
Now try with JSESSION ID iamfedup , which will automatically look for iamfedup.session
First Upload iamfedup2.session named file
then Call the iamfedup2 , this will automatically call for iamfedup2.session
(I messed up in between so I did the process again with new port i.e. 1234) Got the Reverse Shell
Getting user.txt
Simply run command to escape docker shell, by mounting /root of VirusBucket to /mnt, then add your ssh keys to authorized keys
After adding authorized keys , login with SSH into the machine
Finally we are the root.
Don’t forget to get your root.txt

--

--

--

OSCP | CEH | Cyber Security Enthusiast.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

An API to the Tangle of IOTA

Connect To EC2 Machine Remotely From Your Windows Machine

Introducing Prometheus with Grafana: Metrics Collection and Monitoring

13.2 Implementing a Directional Light with Lambertian Reflectance

images/Lighting/ZeroDegrees.png

TIP: Beware of Early Detailed Schedules

FT2232H and NeoPixel

Mining Revenue Statement of the Second Phase of LBK Cloud-Hashrate Rental (06.15–07.12)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Dhanishtha Awasthi

Dhanishtha Awasthi

OSCP | CEH | Cyber Security Enthusiast.

More from Medium

Know What Is Vertical Sleeve Gastrectomy or VSG Surgery?

Telling Time: Joshua

List Of Highest Wicket Takers In Test Cricket

CS373 Spring 2022: Sage Sanford