Academy is an easy-rated Linux machine from HackTheBox, created by sau123. In the current post, my IP is 10.10.14.16, and the target IP is 10.10.11.224
This machine is quite linear. After the reconnaissance phase upon entering the website, you can see what it is and its version. After some investigation you find an easily executable SSRF (Server-Side Request Forgery) vulnerability, and then discover a different site within a filtered port, where you once again search for a specific exploit to gain entry into the system. The privilege escalation is straightforward, and the steps are part of a generic privilege escalation search.
Recon
The first steps are about getting basic information about the target, by using nmap and searching information from the website.
Local Terminal
$ping-c110.10.11.224PING10.10.11.224 (10.10.11.224) 56(84) bytes of data.64bytesfrom10.10.11.224:icmp_seq=1ttl=63time=167ms---10.10.11.224pingstatistics---1packetstransmitted,1received,0%packetloss,time0msrttmin/avg/max/mdev=166.632/166.632/166.632/0.000ms
By the TTL, we can assume that is a Linux Machine.
From the exploit we need and specific configuration, follow the instructions.
Reverse Shell [Puma]
Now go with your browser, http://10.10.11.224:55555/4wjs085, it's using Mailtrail, if you search about it, you will find an exploit at the login page, so now we need to change the configuration and send a POST request with curl.
Now we need 3 terminals, one to prepare the http.server with a reverse shell, another one listening, and the third one to execute the exploit.