Haircut File
: Once the shell is uploaded, navigating to that file executes the malicious code, providing a low-privileged shell on the target system. Privilege Escalation :
The primary goal of the Haircut box is to exploit a vulnerable web application and escalate privileges to root. : Initial scans reveal an HTTP service running on port 80.
: Enumeration of the system reveals a specific version of screen (typically version 4.05.00) that has the SUID bit set. haircut
: Authors like Emily Bagwell and ArthurStuart have posted community-favorite write-ups focusing on the curl injection and screen exploitation phases.
: This version of screen is vulnerable to a local privilege escalation (LPE) exploit (CVE-2017-5618), which allows an attacker to gain root access by manipulating log files. Key Resources for Walkthroughs : Once the shell is uploaded, navigating to
: The curl functionality is vulnerable to parameter or command injection. By using specific flags like -o (output), attackers can write a malicious file, such as a PHP reverse shell, into an accessible directory like /uploads/ .
Further exploration of the web application often identifies a PHP script that performs a curl command based on user-provided input. : : Enumeration of the system reveals a specific
In cybersecurity and technical communities, a typically refers to a walkthrough for the retired Hack The Box (HTB) machine named Haircut .