HTB - Shibboleth Walkthrough 🥷
“Don’t half-ass it. When you stop midway, you lose your momentum and make dumb mistakes.”
🔍 Initial Recon
🔎 TCP Scan
Only one port stood tall:
80/tcp open http syn-ack Apache httpd 2.4.41
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to http://shibboleth.htb/
|_http-server-header: Apache/2.4.41 (Ubuntu)
Service Info: Host: shibboleth.htbSo it’s likely a web-based entry point — either a web shell, RCE, or hopefully SSH later on (I like having a stable shell, sue me).
🔎 UDP Scan
623/udp open asf-rmcpYup. That’s IPMI. A classic hole in many networks. Tucking that away for later…
🌐 Subdomain Discovery
ffuf -u http://shibboleth.htb -H 'Host: FUZZ.shibboleth.htb' -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt -fw 18Found:
All routed to the same interface/site. Interesting. Burp showed some app behavior, but nothing juicy yet.
🔁 Circle Back to UDP (623/IPMI)
Ref: HackTricks on IPMI
Used Metasploit to pull potential hashes:
💥 Got a juicy hash:
Saved it and cracked it:
🔐 Zabbix Login
Tried creds on Zabbix from subdomain — and it worked.
🖥️ Reverse Shell via Zabbix
To execute a reverse shell, used Zabbix's system.run[] item:

⚠️ Without nowait, the session died in ~4 seconds. Annoying little gotcha.
Made the shell stable with:
🔄 Priv Esc - Switching Users
Poked around. Found a second user: ipmi-svc. Tried the same password. It worked.
🧪 Enumeration & Dead Ends
Checked
/etc/zabbix/zabbix_server.conffor DB creds.Looked at sudo perms.
Dug through config files.
Nada. No root path in sight. (Paused here because guests showed up. Came back later.)
🤯 Moment of Clarity: MariaDB Version Exploit (CVE-2021-27928)
Should’ve thought of this sooner. It’s literally part of what I do at work — check SBOMs and versions.
Saw MySQL version was 10.3.25 → vulnerable.
Then triggered:
and you get a shell as root
🔥 ROOT SHELL DROPPED.
🧠 Lessons Learned
Don’t half-ass walkthroughs — finish what you start. Pausing mid-box kills flow and costs you time.
IPMI still sucks.
Zabbix + misconfigs = pwnage.
Last updated