HackTheBox | Titanic Writeup
This article outlines the exploitation process of the Titanic machine on HackTheBox, detailing the steps from initial enumeration to privilege escalation. Utilizing vulnerabilities like Local File Inclusion (LFI) and an outdated version of ImageMagick allowed the attacker to gain access, crack a developer’s credentials, and ultimately achieve root privileges. Affected: Titanic machine, Gitea instance, ImageMagick

Keypoints :

  • The Titanic machine is a virtual environment designed for penetration testing.
  • Initial enumeration revealed open ports and services (SSH on port 22, HTTP on port 80).
  • A Local File Inclusion (LFI) vulnerability allowed access to sensitive files such as the /etc/passwd and Gitea database.
  • The Gitea instance stored user credentials in an SQLite database, which was exploited to gain access to the developer’s account.
  • The attacker exploited an outdated version of ImageMagick to escalate privileges from user to root.
  • Crafting a malicious shared library was crucial for executing arbitrary commands during image processing.
  • The exploitation led to full system compromise, emphasizing the need for stringent security measures.

Full Story: https://infosecwriteups.com/hackthebox-titanic-writeup-5f549dd90f38?source=rss—-7b722bfd1b8d—4