first enum with nmap
# Nmap 7.94SVN scan initiated Wed May 21 15:09:10 2025 as: /usr/lib/nmap/nmap --privileged -sCV -T4 -p22,53,80,88,135,139,389,445,464,593,636,3268,3269,9389 -Pn -oN 155_service.txt 10.129.90.155
Nmap scan report for 10.129.90.155
Host is up (0.21s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH for_Windows_9.5 (protocol 2.0)
53/tcp open domain Simple DNS Plus
80/tcp open http Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.2.12)
|_http-server-header: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
|_http-title: Did not follow redirect to http://frizzdc.frizz.htb/home/
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-05-21 20:09:32Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
9389/tcp open mc-nmf .NET Message Framing
Service Info: Hosts: localhost, FRIZZDC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2025-05-21T20:09:44
|_ start_date: N/A
|_clock-skew: 6h00m13s
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed May 21 15:10:13 2025 -- 1 IP address (1 host up) scanned in 62.97 seconds
add the
frizzdc.frizz.htb
to/etc/hosts
file
checking out the web service
opening the web app on browser we can see it runs an education platform.
navigating to the staff login page, we can see it is running gibbon v25.0.0
.
lil bit of research shows the gibbon version is vuln to lfi (local file inclusion) vulnerability.
we can see the endpoint for lfi is http://frizzdc.frizz.htb/Gibbon-LMS/index.php?q=lfi
. we using gibbon.sql, and we can see the info about the sql db.
found an exploit on github to trigger RCE
let’s clone and run the exploit
ran the exploit and we got RCE.
we check the dirs for files, we can see internal files. let’s play around, pop shell
checking the conifg.php file, we got creds.
$databaseServer = 'localhost';
$databaseUsername = 'MrGibbonsDB';
$databasePassword = 'MisterGibbs!Parrot!?1';
$databaseName = 'gibbon';
Pop a revershell.
Privilege Escalation
enumerating mysql
using the creds we got from config.php
. we got user frizzle
password and salt.
check what hash it is, we can see it is sha-256
with the salt
┌──(n16hth4wk㉿n16hth4wk-sec)-[~/Documents/HTB/thefrizz]
└─$ cat hash.txt
067f746faca44f170c6cd9d7c4bdac6bc342c608687733f80ff784242b0b0c03:/aACFhikmNopqrRTVz2489
cracked the hash to Jenni_Luvs_Magic23
.
login the webpage using the cracked creds f.frizzle:Jenni_Luvs_Magic23
.
┌──(n16hth4wk㉿n16hth4wk-sec)-[~/Documents/HTB/thefrizz]
└─$ ssh f.frizzle@10.129.206.246
f.frizzle@10.129.206.246: Permission denied (gssapi-with-mic,keyboard-interactive).
ssh was enabled, trying to login ssh failed. getting some error
Mehnnnnn after hours of research, almost 24hours of stakoverflow, unixoverflow. gpt 😂, we got shell as user f.frizzle
steps to getting shell as user
f.frizzle
.
[libdefaults]
default_realm = FRIZZ.HTB
[realms]
FRIZZ.HTB = {
kdc = 10.129.197.79
admin_server = 10.129.197.79
}
[domain_realm]
.frizz.htb = FRIZZ.HTB
frizz.htb = FRIZZ.HTB
first edit your /etc/krb5.conf
file. if you don’t have install using
sudo apt install krb5-user
After setting up your krb5.conf file
kinit f.frizzle@FRIZZ.HTB
ssh f.frizzle@10.129.197.79
we got shell as user f.frizzle
.
running winpeas.exe, we got to see there’s a UAC. let’s try bypass it.
After hours of trials and errors, looking for deleted files, we can got RE2XMEG.7z
file. copied it to user f.frizzle
directory.
command ran
#checking the r.bin dir for user f.frizzle sid
Get-ChildItem -Path "C:\`$Recycle.Bin" -Force
#checking user sid dir
Get-ChildItem -Path "C:\`$Recycle.Bin\S-1-5-21-2386970044-1145388522-2932701813-1103" -Force
#copy the file to user desktop directory
Copy-Item -Path 'C:\$Recycle.Bin\S-1-5-21-2386970044-1145388522-2932701813-1103\$RE2XMEG.7z' -Destination "C:\Users\f.frizzle\Desktop\recover.7z"
download the file using scp
Extracting the content of the files. can checking the conf path, found a cred, looks like base64 enc
decode the enc to get pass !suBcig@MehTed!R
.
trying the knit with list of users in the machine, it failed and got accepted for user m.schoolbus
. let’s login ssh
ssh as user M.schoolbus