A detailed walkthrough of the HackTheBox 'Sorcery' machine, a complex Linux box running a Rust Rocket web app backed by Neo4j, Gitea, and Kafka. The path to root involves exploiting Cypher injection in a derive-macro-generated query to leak a seller registration key, using XSS in a product description to register a passkey on the admin account via a headless Chrome bot, abusing an SSRF in a port-debug tool to send Kafka wire protocol messages for RCE in the DNS container, recovering a CA keypair from FTP, phishing a user via mitmproxy, reading credentials from an Xvfb framebuffer, reversing a .NET binary for Docker Registry OTP auth, and finally abusing FreeIPA roles over LDAP to escalate to root.

1h 55m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconsorcery.htb admin AccessShell as user@dnsShell as tom_summersShell as tom_summers_adminShell as donna_adamsShell as ash_winterShell as rootBeyond Root - Cleanup Abuse

Sort: