Nibbles HTB Writeup

Phase 1 : Recon

1. Starting off with an Nmap Scan to get information about the open ports.

Part 2 : Enumeration

  1. Let’s begin our enumeration by visiting the webpage on port 80.

Part 3 : Getting Reverse Shell

Since we have logged In now we can upload our Reverse Shell in the Image Plugin as mentioned in the exploit above.

Part 4: Getting User Flag

We can get the user flag by changing directory to /home/nibbler

Part 5: Getting Root Flag

Now let’s start our journey of privilege escalation by running the command sudo -l.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Viren Saroha

Viren Saroha

Student | HTB/THM Player | Security Researcher