Yummy
Synopsis
OS
Difficulty
Points
Release Date
Retired Date
Enumeration
Nmap
nmap -Pn -sC -sV --min-rate=1000 10.10.11.36
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-26 08:53 EST
Nmap scan report for yummy.htb (10.10.11.36)
Host is up (0.39s latency).
Not shown: 62793 closed tcp ports (conn-refused), 2740 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 a2:ed:65:77:e9:c4:2f:13:49:19:b0:b8:09:eb:56:36 (ECDSA)
|_ 256 bc:df:25:35:5c:97:24:f2:69:b4:ce:60:17:50:3c:f0 (ED25519)
80/tcp open http Caddy httpd
|_http-server-header: Caddy
|_http-title: Yummy
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 231.39 secondsWeb - yummy.htb




File - crontab
File - app_backup.sh
File - table_cleanup.sh
File - dbmonitor.sh
File - backupapp.zip
Exploit
Crafting new JWT token - admindashboard access [ Updating role ]
Foothold
Pillaging - mysql database [ SQL injection ]

Shell - mysql [ user - Abusing write privilege ]
Methodology
Exploit
Privilege Escalation
Shell - www-data
Shell - qa [ pillaging www-data ]
Pillaging - qa [ user ]
Shell - dev [ hg pull ]
Pillaging - dev
Shell - root [ rsync ]
Methodology
Exploit
Proof of Concept
Last updated



