Precious HTB Machine Walk-Though!
文章描述了一次针对Hack The Box靶机“Precious”的渗透测试过程。攻击者通过利用pdfkit漏洞获取初始访问权限,随后发现隐藏配置文件中的硬编码凭证实现横向移动,并最终利用不安全的YAML反序列化方法获得root权限。 2025-12-15 10:49:9 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

Nmullenski

Executive Summary

Target: Precious (Hack The Box) OS: Linux Difficulty: Easy Attack Vectors: Web Application (Command Injection) -> Configuration Mismanagement -> Insecure Deserialization.

This assessment targeted “Precious,” a Linux-based machine hosting a “Web-to-PDF” converter service. The initial foothold was gained by identifying an outdated underlying dependency (pdfkit v0.8.6) via metadata analysis. This vulnerability (CVE-2022-25765) allowed for Remote Code Execution (RCE), granting access as the ruby user.

Lateral movement to the user henry was achieved by discovering hardcoded credentials left inside a hidden Ruby Bundler configuration file. Finally, Root privilege escalation was accomplished by exploiting a custom Ruby script with sudo permissions that utilized the insecure YAML.load method, allowing for a deserialization attack that compromised the entire system.

**Not a Member?? CLICK HERE to read Full-Story**

Press enter or click to view image in full size

1.0 Initial Foothold

1.1 Reconnaissance and Enumeration

1.1.1 Scanning the Target: The assessment began with a full TCP port scan using Nmap to identify all open services and gather version information on the target 10.10.11.189.


文章来源: https://infosecwriteups.com/precious-htb-machine-walk-though-a64d23ab1640?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh