ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -u <http://10.10.11.86> -H "Host:FUZZ.soulmate.htb" -fs 154
Sub-domain Enumeration
using -fs to describe file size
3rd step :
from 2nd you get "ftp" as an output so you go int the site
4th step :
5th step :
Now you will get the usernames . but you also need an pass for same to login so now you will put a payload in the burpsuite and change the format to POST
6th step :
You will now be able to reset the pass and put your pass . NOW LOGIN IN the page and upload a reverse shell to get access to the registered users directory .
it will get captured in nc and now get the user flag
9th step :
here is the flag you will get the user flag here-
10th :
now you will get the password of the ben user then do ssh and enter the password and in that you will get the user.txt file in which you will get the flag (all should be done in shell
11th :
now look into running ports . you eill get to know that port 2222 is running .
12th :
now to get the root flag we will do will the users password we got in 9th step :
13th :
after logining we will use er-lang sysntex to get our command worked in cmd of the system
now from CVE of CrushFTP we get to know that unadd some parameters :-
GET /WebInterface/function/?command=getUserList&c2f=1111 HTTP/1.1
Host: target-server:8081
Cookie: CrushAuth=1743113839553_vD96EZ70ONL6xAd1DAJhXMZYMn1111
Authorization: AWS4-HMAC-SHA256 Credential=crushadmin/
refer the Screenshot!! "CrushFTP Authentication Bypass - CVE-2025-2825"