Imagery HTB WriteUp Season 9 Machine 2

Imagery HTB WriteUp Season 9 Machine 2

This article details a penetration testing process, including server reconnaissance, bypassing client restrictions, exploiting vulnerabilities, and privilege escalation. The user successfully accessed sensitive information and obtained flags, demonstrating key hacking techniques. #OpenSSH9.7p1 #Python3 #SQLi

Keypoints

  • Initial server reconnaissance was performed using Nmap to identify open ports and services.
  • The tester bypassed client-side restrictions to access the admin panel and explored several endpoints.
  • Blind XSS and Local File Inclusion (LFI) vulnerabilities were exploited to gather sensitive credentials.
  • Password cracking and remote code execution (RCE) enabled privilege escalation to root.
  • The penetration testing process culminated in obtaining flags from the compromised machine and sharing a LinkedIn profile for further collaboration.

Read More: https://infosecwriteups.com/imagery-htb-writeup-season-9-machine-2-6e09f640a993?source=rss—-7b722bfd1b8d—4