Faculty HTB - [DISCUSSION]
by - Thursday, January 1, 1970 at 12:00 AM
Let's Begin
Reply
I'm seeing an SQL injection (boolean-based blind) in the login form:

sqlmap -u "http://faculty.htb/admin/ajax.php?action=login_faculty" --data "id_no=1111" -p id_no --batch --level 2 --dbms=Mysql
Reply
You can access admin dashboard with admin' -- - as the username


No idea how to proceed though, didn't find anything to do from there
Reply
(July 2, 2022, 07:17 PM)Erik Wrote: You can access admin dashboard with admin' -- - as the username


No idea how to proceed though, didn't find anything to do from there


Where did you find the admin dashboard?
Reply
Dirbusting, in /admin
Reply
School system seems to have severals exploits but no RCE

https://www.exploit-db.com/search?q=School+Faculty+Scheduling+System

Checking if I find an RCE
Reply
(July 2, 2022, 07:24 PM)Erik Wrote: Dirbusting, in /admin


There is an admin user in the database dump, but I couldn't crack the hash.

There are also 3 valid IDs for http://faculty.htb/login.php
Reply
Found those two things but not sure if that's any useful yet :
https://github.com/mpdf/mpdf/issues/949
https://pentest.co.uk/labs/leveraging-xss-to-get-rce-in-textpattern/


How can this be harder than Carpe Diem, fuck me
Reply
When I'm adding (and encoding) to the pdf parameter of /admin/download.php, I'm getting an incoming request to my Python server.
Reply
[quote="Exa" pid="117869" dateline="1656792178"]When I'm adding (and encoding) to the pdf parameter of /admin/download.php, I'm getting an incoming request to my Python server.[/quote]From you or from the taget ?
Reply


 Users viewing this thread: Faculty HTB - [DISCUSSION]: No users currently viewing.