Hackthebox.eu - Retired - Bastard     Recon   As always I start with a simple Up/Down scan on all TCP port to see what is open   # nmap -T4 -p- -oX ./nmapb.xml bastard.htb   Then I convert it to HTML to make it pretty :)    xsltproc ./nmapb.xml -o ./nmapb.html     We have port 80,135 and 49154   Let's scan just again on those ports with the -A switch to finger OS/Services   # nmap -T4 -p80,135,49154 -A -oX ./nmapf.xml bastard.htb   Then convert that to HTML also     xsltproc ./nmapf.xml -o ./nmapf.html     So we have IIS 7.5 on 80 and RPC on 135 and 49154   Lets see whats on 80     A login form powered by Drupal   There are a bunch of listings in the robots.txt for the site     I found this while enumerating through the robots.txt list     Drupal 7.54   Expolit   Googling around for exploits on Drupal 7.54 we find   https://github.com/pimps/CVE-2018-7600   Which will allow us to execute commands with   I cloned it to my attacking machine   # git clone https://github.co...
@circusmonkey404 on the twitters; DM for contact