HTB - Dog Machine [help]
by edimirbahia - Sunday March 30, 2025 at 03:06 PM
#1
I'm currently working on the "DOG" box  and I was able to gain a shell as www-data by exploiting Backdrop CMS and uploading a webshell module. From there, I upgraded my shell using Python (pty.spawn("/bin/bash")) and verified that I have basic shell access.

I've already run LinPEAS and Linux Exploit Suggester, which pointed out potential privesc vectors like CVE-2021-4034 (PwnKit), but that led me straight to root. What I'm really trying to figure out now is how to escalate from www-data to the user account that owns the user.txt
flag.


I still can’t seem to find a way to pivot from www-data to the target user.
Any nudges or suggestions would be much appreciated — even just a hint toward what to focus on would help a lot.
Thanks in advance! ?
Reply
#2
where is the file ,git has a username and pasword
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 376 93,738 1 hour ago
Last Post: Sukon
  [FREE] CPTS • CWES • CDSA • CWEE Exam Hint 3midjets 233 32,336 1 hour ago
Last Post: Sukon
  [FREE] CPTS 12 FLAGS pulsebreaker 74 2,366 1 hour ago
Last Post: Sukon
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 89 8,101 6 hours ago
Last Post: Xploitd
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 10 629 10 hours ago
Last Post: chufoni

Forum Jump:


 Users browsing this forum: 1 Guest(s)