Fireworks

TryHackMe KoTH Machine - Fireworks


Port Scan -

Found an id_rsa private ssh key via ftp

  • cracked pass for key - t<redacted>1

Exploiting SQLI on endpoint /classes/Master.php -

It might be different endpoint, its random. Box even has a broken access control vuln, every poc you can find in above links

got admin hash after dumping the db

LFI after admin dashboard access -

Initial Foothold on the box as david user using the id_rsa we found earlier -

escape the fireshell -

privesc to root -

Fireshell

Port 8080 - mblog

Default Admin Creds for mblog 3.5.0 -

SSTI - CVE-2024-28713

index.ftl -

Mysql db root pass -

Xwiki on port 8080 -

Default admin creds -

XWiki RCE (CVE-2024-31982) - exploit

Thomas user from docker -

Fireshell 3 - escape less

Magento 2.4.6 - Bitnami on port 8080 -

JWT Cryptographic key /bitnami/magento/app/etc/env.php

XXE Magento -

Thomas id_rsa path

Grep pattern to search for flags -

Last updated