BlockBlock
Synopsis
OS
Difficulty
Points
Release Date
Retired Date
Enumeration
Nmap
nmap -Pn -sC -sV --min-rate=1000 10.10.11.43
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-30 10:40 EDT
Nmap scan report for 10.10.11.43
Host is up (0.95s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.7 (protocol 2.0)
| ssh-hostkey:
| 256 d6:31:91:f6:8b:95:11:2a:73:7f:ed:ae:a5:c1:45:73 (ECDSA)
|_ 256 f2:ad:6e:f1:e3:89:38:98:75:31:49:7a:93:60:07:92 (ED25519)
80/tcp open http Werkzeug httpd 3.0.3 (Python 3.12.3)
|_http-title: Home - DBLC
|_http-server-header: Werkzeug/3.0.3 Python/3.12.3
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 57.36 secondsWeb - Port 80





File - Database.sol
Exploitation
Report User Feature - XSS [ Getting Admin JWT token ]


Foothold
Shell - keira [ Getting Raw Blockchain ]




Lateral Movement
Pillaging - keira [ user ]
Shell - paul [ RCE via forge ]
Methodology
Exploit
Privilege Escalation
Pillaging - paul [ user ]
Shell - root [ pacman privilege escalation ]
Methodology
Exploit
Proof of Concept
Last updated
