Outbound

NMAP RECON

nmap -p- --open -sCV 10.10.11.77 --min-rate 5000 -n -Pn -oG allPorts
######################################
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 0c:4b:d2:76:ab:10:06:92:05:dc:f7:55:94:7f:18:df (ECDSA)
|_  256 2d:6d:4a:4c:ee:2e:11:b6:c8:90:e6:83:e9:df:38:b0 (ED25519)
80/tcp open  http    nginx 1.24.0 (Ubuntu)
|_http-title: Did not follow redirect to http://mail.outbound.htb/
|_http-server-header: nginx/1.24.0 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

We can se a http:80 web sever a ssh:22 service. Nmap get us a website and subdomain, outbound.htb && mail.outbound.htb. Add in into /etc/hosts (basic virtual hosting)

We can see, it panel login work with "Roundcube Webmail", so.... search someone exploit -->

Rondcube EXPLOIT

I found a acctualy exploit about Roundcube, it is a RCE, try to run -->

We can see that this version is vulnerable, but we need a user account. HTB give us a user account simulate a real audit -->

As is common in real life pentests, you will start the Outbound box with credentials for the following account tyler / LhKL1o9Nm3X2

NICE! Apparentily, it found! So... send me a revershell -->

www-data USER

We can see three users and one of it is tyler, try to up with sudo and the same password of web service

tyler USER

After search, found a diretorie /var/www/html/roundcube/

And we can see internal inforamtion about the SQL database -->

SQL database

We can connect to this ddbb and get info about other users -->

There is the table users... but there is nothing... we can see anothe table with name; session -->

yoooo, wtf, it biggest, so... apparentily base64 -->

Go to cybercheft -->

After read, we can obten the clear password with the password encrypt and auth_scret -->

First decode base64 the password and enconde HEX -->

Now, we need decrypt 3DES -->

Triple Decrypt 3DES

It need a IV in HEX, we have the password in HEX, nice. And need too, a key...

After search, into config.inc.php we can see a des_key -->

jacob:595mO8DmwGeD

jacob USER

Now with the user jacob, we can see we are into @mail, adn we can see into his home directorie a folder with name INDOX with credentials

jacob:gY4Wr3a1evp4

USER FLAG

We can try to connect via ssh -->

Now we can try to climb at root -->

Wtf id below?? SEARCH INFO -->

ROOT FLAG - CVE-2025-27591

Okay... soo... read it -->

Go to /var/log/below -->

we can write into error_root.log and read root2

Generate a new password for root -->

Now exploit -->

The password is = 1

Last updated