Heal
Synopsis
OS
Difficulty
Points
Release Date
Retired Date
Enumeration
Nmap
nmap -Pn -sC -sV --min-rate=1000 10.10.11.46
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-17 07:43 EDT
Nmap scan report for 10.10.11.46
Host is up (0.50s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 68:af:80:86:6e:61:7e:bf:0b:ea:10:52:d7:7a:94:3d (ECDSA)
|_ 256 52:f4:8d:f1:c7:85:b6:6f:c6:5f:b2:db:a6:17:68:ae (ED25519)
80/tcp open http nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to http://heal.htb/
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 41.54 secondsWeb - heal.htb





Web - api.heal.htb

Web - take-survey.heal.htb


Fuzzing - Directories

Ruby Files - Path Traversal Exploit [ heal.htb ]

Database - development.sqlite3 [ LimeSurvey Access ]


Foothold
Shell - www-data [ LimeSurvey RCE ]
Exploit
Privilege Escalation
Shell - ron
Pillaging - ron [ user ]
Shell - root [ consul RCE ]
Exploit
Proof of Concept
Last updated

