HTB-Nibbles Writeup (OSCP prep)
<h1>Introduction</h1>
<p>Referring to <a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#" rel="noopener ugc nofollow" target="_blank">NetSecFocus Trophy Room</a>, here is the information and steps for the machine, Nibbles.</p>
<p><img alt="" src="https://miro.medium.com/v2/resize:fit:535/1*wCLil8lTfeut9QFI_Vc0LA.png" style="height:475px; width:486px" /></p>
<h2>Information</h2>
<ul>
<li>Victim IP: 10.10.10.75</li>
<li>Attack IP: 10.10.16.5</li>
</ul>
<h2>Vulnerability description</h2>
<ul>
<li>Nibbleblog is vulnerable to CVE-2015–6967.</li>
<li>The website is using weak password.</li>
<li>There is an issue with improperly configured permissions for the monitor.sh.</li>
</ul>
<h1>Attack Steps</h1>
<h2>Enumerate</h2>
<p>Use command `rustscan -u 5000 -a 10.10.10.75 — -sVC -oN tcp.txt` scan the open tcp port and use nmap scan service detail information.</p>
<p><a href="https://medium.com/@viviol7949/htb-nibbles-writeup-oscp-prep-d5701a4cc1af"><strong>Visit Now</strong></a></p>