Skyfall

Recon

Let's start with a nmap scan.

Let's visit the website. It look a cloud storage service. We are also able to find a team section and 3 email IDs.

Directory enumeration uncovered multiple image assets, which are not deemed valuable. Subsequently, subdomain enumeration using ffuf revealed the presence of a subdomain named demo.skyfall.htb. Let's explore this subdomain to gather additional information.

Initial Access

We have a login page with demo login details: guest:guest.

On the left panel, there is an entry labeled "Min10 Metrics." However, attempting to access Min10 Metrics directly results in a 403 forbidden error. This access restriction can be circumvented by appending %0a at the end of the URL.

We can see a URL at the endpoint.

MinIO is reported to have the CVE-2023-28432 vulnerability, which entails an information leak risk. Exploiting this vulnerability can result in the exposure of sensitive information.

We can use this github link to exploit this vulnerability:

We've obtained:

To install the Min10 client follow the steps at:

Now let’s execute the Min10 client.

Let’s check for files.

Here we can find some backup files with the .gz extension. Let's download those files and decompress them.

Upon further enumeration of files with the .gz extension, we found these.

To install Vault we have to Download the Vault Binary First.

Add “prd23-vault-internal.skyfall.htb” to the /etc/hosts file. Then, run the command as follows:

We can log in now.

When we list the SSH roles, we see different roles, but for now we can only access dev_otp_key_role.

To obtain user access, execute the following code. An OTP will be generated, and use the OTP as the password for the SSH connection:

We've got our first flag.

Privilege Escalation

Upon executing the following command, we observe the creation of a debug.log file.

Upon inspecting the debug.log file, we discover an additional Vault Token.

Next, we must substitute the Vault Token with a fresh one.

Once the role has been configured as admin_otp_key_role, we gain access to log in as root.

We are root and have our root flag.

Last updated

Was this helpful?