A detailed walkthrough of the HackTheBox 'Sorcery' machine, a complex Linux box running a Rust Rocket web app backed by Neo4j, Gitea, and Kafka. The path to root involves exploiting Cypher injection in a derive-macro-generated query to leak a seller registration key, using XSS in a product description to register a passkey on the admin account via a headless Chrome bot, abusing an SSRF in a port-debug tool to send Kafka wire protocol messages for RCE in the DNS container, recovering a CA keypair from FTP, phishing a user via mitmproxy, reading credentials from an Xvfb framebuffer, reversing a .NET binary for Docker Registry OTP auth, and finally abusing FreeIPA roles over LDAP to escalate to root.
Table of contents
Box InfoReconsorcery.htb admin AccessShell as user@dnsShell as tom_summersShell as tom_summers_adminShell as donna_adamsShell as ash_winterShell as rootBeyond Root - Cleanup AbuseSort: