LinkVortex
Synopsis
OS
Difficulty
Points
Release Date
Retired Date
Enumeration
Nmap
nmap -Pn -sC -sV --min-rate=1000 10.10.11.47
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-20 21:03 EDT
Nmap scan report for 10.10.11.47
Host is up (8.0s latency).
Not shown: 749 filtered tcp ports (no-response), 249 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open tcpwrapped
|_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
80/tcp open tcpwrapped
|_http-server-header: Apache
|_http-title: Did not follow redirect to http://linkvortex.htb/
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 62.18 secondsWeb - linkvortex.htb


Fuzzing
Web - dev.linkvortex.htb

Fuzzing
Git

Foothold
Shell - bob [ CVE-2023 -40028 exploit ]

CVE-2023-40028
Exploit
Privilege Escalation
Pillaging - bob [ user ]
File - clean_symlink.sh
Shell - root [ TOCTOU ]
Methodology
Exploit
Proof of Concept
Last updated
