BoardLight
Majd Abuleil
3 min read


nmap -A -p- [ IP ]


Found: 22 SSH & 80 HTTP
Now looking at the website


The only thing that works here is Contact Us, but it doesn’t give us anything
So now I use the wfuzz tool to enumerate directories and subdomain,s and found this:
After trying without any result, I found an email on the site >> info@board.htb, so I added the IP of the machine and the name board.htb into the /etc/hosts file, and I used the tool again
wfuzz command that I used:
wfuzz -c -w /usr/share/wordlists/SecLists-master/Discovery/DNS/subdomains-top1million-20000.txt –hc 400,403,404 –hl 517 -H “Host: FUZZ.board.htb” -u http://board.htb/


wfuzz result:


Found → crm.board.htb


Here, I tried default credentials like username=admin, pass=admin, and that worked, so now I’m inside.


After that I searched for the Dolibarr 17.0.0 exploit I found this:




After I searched, I found the user larissa
and in the file conf.php I found these credentials


After I used this to enter the DB I found two users with the hash of their password, but it took a lot of time to crack the hash for the user dolibarr and the user admin the hash was admin, which we use in the login page. So I used the password for user larissa to see if this would work, and that worked, I used SSH to connect


USER FLAG ->>>>>>


ROOT FLAG ->>>>>
I started with sudo -l the user was not in the sudo group or can run any tool as sudo so I used the find command to see any file or command that had SUID permissions:
find / -type f -perm /4000 2>/dev/null


I searched for all of the commands here to get root so when I searched for enlightenment_sys, I found this exploit:


download this using git clone and open a server using python in the SSH, I can upload the payload and change the permissions using chmod +x and run this and we root.







