HTB - Shibboleth Walkthrough 🥷

“Don’t half-ass it. When you stop midway, you lose your momentum and make dumb mistakes.”

🔍 Initial Recon

🔎 TCP Scan

Only one port stood tall:

80/tcp open  http    syn-ack Apache httpd 2.4.41
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to http://shibboleth.htb/
|_http-server-header: Apache/2.4.41 (Ubuntu)
Service Info: Host: shibboleth.htb

So it’s likely a web-based entry point — either a web shell, RCE, or hopefully SSH later on (I like having a stable shell, sue me).

🔎 UDP Scan

623/udp open  asf-rmcp

Yup. That’s IPMI. A classic hole in many networks. Tucking that away for later…

🌐 Subdomain Discovery

ffuf -u http://shibboleth.htb -H 'Host: FUZZ.shibboleth.htb' -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt -fw 18

Found:

All routed to the same interface/site. Interesting. Burp showed some app behavior, but nothing juicy yet.

🔁 Circle Back to UDP (623/IPMI)

Ref: HackTricks on IPMI

Used Metasploit to pull potential hashes:

💥 Got a juicy hash:

Saved it and cracked it:

🔐 Zabbix Login

Tried creds on Zabbix from subdomain — and it worked.


🖥️ Reverse Shell via Zabbix

To execute a reverse shell, used Zabbix's system.run[] item:

⚠️ Without nowait, the session died in ~4 seconds. Annoying little gotcha.

Made the shell stable with:

🔄 Priv Esc - Switching Users

Poked around. Found a second user: ipmi-svc. Tried the same password. It worked.

🧪 Enumeration & Dead Ends

  • Checked /etc/zabbix/zabbix_server.conf for DB creds.

  • Looked at sudo perms.

  • Dug through config files.

  • Nada. No root path in sight. (Paused here because guests showed up. Came back later.)

🤯 Moment of Clarity: MariaDB Version Exploit (CVE-2021-27928)

Should’ve thought of this sooner. It’s literally part of what I do at work — check SBOMs and versions.

Saw MySQL version was 10.3.25 → vulnerable.

Then triggered:

  • and you get a shell as root

🔥 ROOT SHELL DROPPED.

🧠 Lessons Learned

  • Don’t half-ass walkthroughs — finish what you start. Pausing mid-box kills flow and costs you time.

  • IPMI still sucks.

  • Zabbix + misconfigs = pwnage.

Last updated