Soulmate - Easy


1st step :

nmap -sV -a 10.10.11.86 -vvv

2nd step :

ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -u <http://10.10.11.86> -H "Host:FUZZ.soulmate.htb" -fs 154

Sub-domain Enumeration

 using -fs to describe file size

3rd step :

from 2nd you get "ftp" as an output so you go int the site

4th step :


5th step :

Now you will get the usernames . but you also need an pass for same to login so now you will put a payload in the burpsuite and change the format to POST


6th step :

You will now be able to reset the pass and put your pass . NOW LOGIN IN the page and upload a reverse shell to get access to the registered users directory .

go in the current user and upload the php file


7th step :

no go on site for reverseshells - reverseshells.comarrow-up-right

create a exploit of php - php monkey and open listner in one terminal


8th step :

Now go in firefox and run the php exploit - http://ftp.soulmate.htb/amal.phparrow-up-right

it will get captured in nc and now get the user flag


9th step :

here is the flag you will get the user flag here-


10th :

now you will get the password of the ben user then do ssh and enter the password and in that you will get the user.txt file in which you will get the flag (all should be done in shell


11th :

now look into running ports . you eill get to know that port 2222 is running .


12th :

now to get the root flag we will do will the users password we got in 9th step :


13th :

after logining we will use er-lang sysntex to get our command worked in cmd of the system


Enjoy..

Last updated

Was this helpful?