# HackTheBox-Spectra
## NMAP
```
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.1 (protocol 2.0)
| ssh-hostkey:
|_ 4096 52:47:de:5c:37:4f:29:0e:8e:1d:88:6e:f9:23:4d:5a (RSA)
80/tcp open http nginx 1.17.4
|_http-server-header: nginx/1.17.4
|_http-title: Site doesn't have a title (text/html).
3306/tcp open mysql MySQL (unauthorized)
8081/tcp open blackice-icecap?
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 200 OK
| Content-Type: text/plain
| Date: Thu, 04 Mar 2021 16:38:15 GMT
| Connection: close
| Hello World
| GetRequest:
| HTTP/1.1 200 OK
| Content-Type: text/plain
| Date: Thu, 04 Mar 2021 16:38:14 GMT
| Connection: close
| Hello World
| HTTPOptions:
| HTTP/1.1 200 OK
| Content-Type: text/plain
| Date: Thu, 04 Mar 2021 16:38:25 GMT
| Connection: close
|_ Hello World
```
## PORT 80 (HTTP)
Clicking on `Test` or `Softwaer Issue Tracker` would be leading us to `http://spectra.htb` so let's add this to `/etc/hosts`
Going to `wp-config.php.save` we can find credentials to the database
But when connecting to them it just doesn't allow
### Wpscan
So we can't connect to mysql so we have a wordpress site let's run `wpscan` on it
So we have a wordpress user `administrator`
Using the password `devteam01` we logged in with `administrator`
We can edit the `404.php` template in the active theme
Using a metasploit payload
Add ssh public key in `/home/nginx/.ssh/authorized_keys`
Going in `/opt` directory
We find a `passwd` file
ssh as `katie`
On doing `sudo -l` we'll see what we can run as root
And we can run `initctl` which is used for running services, these services are stored in `/etc/init`
We can see the services we can edit
Here this service is running a nodejs file which is `nodetest.js`
This is what we see when we visit port 8081 on the web browser we can edit this file by a node js reverse shell
After editing set a netcat listener