HacktheBox.eu - Irked - Update Recon Let's use threader3000 for our recon scan. It's a threaded scanner written in python that does a super quick up/down scan on all TCP ports, then suggests a nmap scan based on the results. It will automatically save the nmap scan results as XML, then we can convert it to HTML xsltproc ./irked.htb/irked.htb.xml -o ./irked.html We've got a goodly amount of ports open to us on this box 22,80,111,6697,8067,55015,65534 We can see 22 is OpenSSH 6.7p1 80 is Apache 2.4.10 111 & 55015 both say RPC And the others say UnreallRCd…. Whatever that is, Lets start on port 80 and see what it shows us. An angry face with "IRC is almost working!" If we run dirb we will find some default apache pages but not much else to go on What is that UnreallRCD? https://www.unrealircd.org/ Oh it's an IRC server… that makes sense. If we google UnrealRCD and exploit, there appears to be a backdoor in some versions although we don't know what specif
@circusmonkey404 on the twitters; DM for contact