Proving Grounds: BBSCute

Ryan Yager
3 min readMay 26, 2023

--

Today we are going to look at an easy machine BBSCute on Proving Grounds. Starting off with a portscan as usual we find the following:

One thing that stands out to me is port 88 which is usually Kerberos, looking more closely at it we find it is running a web server:

We will keep that in the back of our heads and it was a 404 not found. Moving on…

Going to port 80 we see a default apache page, I always like to do an index.html and also index.php, and this time we get a hit with index.php

At the bottom we can see something about cutenews, lets see if we can exploit that:

Looks like everything is authenticated, so we first need a username and password, utilizing the last exploit we can get remote code execution, however do need to change up the file:

Notice we are not going to CuteNews, so we have to go index.php and delete cutenews whereever it may exists in the exploit itself:

Continuing on we now have RCE:

We do a bash reverse shell to get a full shell on the machine, continuing:

We can run hping3, at first I tried with sudo but then I realized that I did not need to:

And we are finished, thanks for reading and hopefully you learned something while doing this box.

--

--

Ryan Yager
Ryan Yager

Written by Ryan Yager

Known on Twitch and YouTube as OvergrownCarrot1 or OGC

No responses yet