Post

HackTheBox Appointment Writeup

HackTheBox Appointment Writeup

Appointment-HTB

TL;DR

This writeup is based on the Appointment machine, an easy-rated Linux box on Hack The Box. After scanning the target, I found that port 80 was open, running Apache httpd 2.4.38. Visiting the website revealed a login page, so I performed directory fuzzing but found no useful files. I then attempted common login credentials but was unsuccessful. Next, I tested for SQL injection vulnerabilities and found that the login form was vulnerable. Using a simple SQL injection payload, I bypassed authentication and gained access, revealing a flag on the webpage.

Scanning Network

I began by performing an Nmap scan, which revealed open port 80, corresponding to Apache httpd 2.4.38. Here are the results from the Nmap scan:

1
2
3
4
5
6
7
8
9
nmap -sC -sV -A -T4 -Pn 10.129.12.234 -oN scan/normal.scan
Starting Nmap 7.94 ( https://nmap.org ) at 2025-02-16 16:09 IST
Nmap scan report for 10.129.12.234
Host is up (0.21s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.38 ((Debian))
|_http-title: Login
|_http-server-header: Apache/2.4.38 (Debian)

Enumeration

Let’s visit http://10.129.12.234/.

Target Site

I came across a login page, so before investigating the login form, I will start directory fuzzing.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
gobuster dir -u http://10.129.12.234/ -w /usr/share/wordlists/seclists/Discovery/Web-Content/raft-small-directories-lowercase.txt -o gobuster.dir-fuzz
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://10.129.12.234/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/seclists/Discovery/Web-Content/raft-small-directories-lowercase.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/images               (Status: 301) [Size: 315] [--> http://10.129.12.234/images/]
/js                   (Status: 301) [Size: 311] [--> http://10.129.12.234/js/]
/css                  (Status: 301) [Size: 312] [--> http://10.129.12.234/css/]
/fonts                (Status: 301) [Size: 314] [--> http://10.129.12.234/fonts/]
/vendor               (Status: 301) [Size: 315] [--> http://10.129.12.234/vendor/]
/server-status        (Status: 403) [Size: 278]
Progress: 17770 / 17771 (99.99%)
===============================================================
Finished
===============================================================

I didn’t find any interesting directories or files during directory fuzzing, so let’s now investigate the login page.

Exploitation

The first step in attacking a login page is to test for weak or default credentials such as:

1
2
3
4
admin:admin
admin:password
administrator:password
root:root

After attempting all the above combinations, I was still unable to log in. The next logical step is to test for SQL Injection vulnerabilities.

SQL Query

Since the website is likely built using PHP, we can try SQL injection payloads in the username and password fields to check if they are vulnerable.

In PHP, the # symbol is used to comment out the rest of a SQL query. This can be exploited to bypass authentication.

username vulnerable to SQL

After submitting the form, we get a page like this:

Flag

Successfully, I have got the flag.

1
e3d0796d002a446c0e622226f42e9672

Tasks

What does the acronym SQL stand for?

1
Structed Query Language

What is one of the most common type of SQL vulnerabilities?

1
SQL Injection

What is the 2021 OWASP Top 10 classification for this vulnerability?

1
A03:2021-Injection

What does Nmap report as the service and version that are running on port 80 of the target?

1
Apache httpd 2.4.38 ((Debian))

What is the standard port used for the HTTPS protocol?

1
443

What is a folder called in web-application terminology?

1
directory

What is the HTTP response code is given for ‘Not Found’ errors?

1
404

Gobuster is one tool used to brute force directories on a webserver. What switch do we use with Gobuster to specify we’re looking to discover directories, and not subdomains?

1
dir

What single character can be used to comment out the rest of a line in MySQL?

1
#

If user input is not handled carefully, it could be interpreted as a comment. Use a comment to login as admin without knowing the password. What is the first word on the webpage returned?

1
Congratulations

Submit root flag

1
e3d0796d002a446c0e622226f42e9672

Thanks for reading this far. If you enjoyed the writeup, do support me here.

This post is licensed under CC BY 4.0 by the author.