Sau
https://www.hackthebox.com/machines/sau

Task 0 - Deploy machine
Task 1 - Reconnaissance
1.1 - Which is the highest open TCP port on the target machine?
command
result
1.2 - What is the name of the open source software that the application on 55555 is "powered by"?



1.3 - What is the version of request-baskets running on Sau?
Task 2 - Find user flag
2.1 - What is the 2023 CVE ID for a Server-Side Request Forgery (SSRF) in this version of request-baskets?



2.2 - There is an unauthenticated command injection vulnerability in MailTrail v0.53. What is the relative path targeted by this exploit?


2.3 - What user is the Mailtrack application running as on Sau?

2.4 - Submit the flag located in the puma user's home directory.
Task 3 - Find root flag
3.1 - What is the full path to the application the user puma can run as root on Sau?

3.2 - What is the full version string for the instance of systemd installed on Sau?

3.3 - What is the CVE ID for a local privilege escalation vulnerability that affects that particular systemd version?

3.4 - Submit the flag located in the root user's home directory.

Last updated


