I started a bruteforce for other users here just in case
That was worth it as I found the user josh with 6ebcea65320589ca4f2f1ce039975995. I could have used the payload from before to get all users, which I noticed later
I enumerated for any subdomains or other vhosts:
Chat at a Subdomain
I actually found mattermost.shoppy.htb
After bruteforcing the hash of josh I could log in there with josh:remembermethisway
There was an interesting text channel
In one of the channels I found working ssh creds jaeger:Sh0ppyBest@pp!
Docker should be used for the deploy machine these credentials are for
I could ssh onto the machine with the creds of jaeger
There are the users with console jaeger, mattermost, postgres and deploy
According to LinPeas the machine is vulnerable to CVE-2022-0847, which is a priv esc exploit
sudo -u deploy /home/deploy/password-manager works, so I might get the creds for the deploy user
There were some interesting files:
MongoDB Access
The last of which contained the mongodb creds DJ7aAdnkCZs9DZWx
I connected to the local mongodb that I found in the index js:
I did not find the admin hash decrypt, but I changed the hash, so the password for admin is also “remembermethisway”:
/home/jaeger/.nvm/versions/node/v18.6.0/bin in in the path
/home/jaeger/ShoppyApp/node_modules/enquirer/lib/prompts/password.js
/home/jaeger/ShoppyApp/node_modules/mongodb/lib/cmap/auth/
/home/jaeger/ShoppyApp/node_modules/mongoose/node_modules/mongodb/lib/cmap/auth/
home/jaeger/ShoppyApp/index.js