Beep Walkthrough
Hey Everyone! Here we come back with one of HackTheBox machines âBeepâ. Before we get started, letâs see machineâs info

Itâs easy and based on Linux OS, letâs get startedâŚ
DNS Enumeration
At the first we will use nmap
to check about the open ports, service running and OS version and other info we will see now
> nmap -A -T4 -oG beep.gnmap 10.10.10.7
-A : service detection, os detection, script results -T4: Threads=4 to increase the speed -oG: to get the output in the extension gnmap to brute force the credentials by brute-spray
The result is
Nmap scan report for 10.10.10.7Host is up (0.20s latency).Not shown: 988 closed portsPORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 4.3 (protocol 2.0)| ssh-hostkey: | 1024 ad:ee:5a:bb:69:37:fb:27:af:b8:30:72:a0:f9:6f:53 (DSA)|_ 2048 bc:c6:73:59:13:a1:8a:4b:55:07:50:f6:65:1d:6d:0d (RSA)25/tcp open smtp Postfix smtpd|_smtp-commands: beep.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, 80/tcp open http Apache httpd 2.2.3|_http-server-header: Apache/2.2.3 (CentOS)|_http-title: Did not follow redirect to https://10.10.10.7/|_https-redirect: ERROR: Script execution failed (use -d to debug)110/tcp open pop3 Cyrus pop3d 2.3.7-Invoca-RPM-2.3.7-7.el5_6.4|_pop3-capabilities: STLS AUTH-RESP-CODE LOGIN-DELAY(0) IMPLEMENTATION(Cyrus POP3 server v2) USER UIDL RESP-CODES APOP TOP PIPELINING EXPIRE(NEVER)111/tcp open rpcbind 2 (RPC #100000)143/tcp open imap Cyrus imapd 2.3.7-Invoca-RPM-2.3.7-7.el5_6.4|_imap-capabilities: UIDPLUS ANNOTATEMORE ACL IDLE OK THREAD=ORDEREDSUBJECT CATENATE LISTEXT LITERAL+ X-NETSCAPE ATOMIC CONDSTORE LIST-SUBSCRIBED URLAUTHA0001 ID MAILBOX-REFERRALS THREAD=REFERENCES IMAP4 IMAP4rev1 NAMESPACE NO SORT=MODSEQ UNSELECT STARTTLS SORT RENAME RIGHTS=kxte BINARY QUOTA MULTIAPPEND Completed CHILDREN443/tcp open ssl/https?|_ssl-date: 2020-12-08T14:07:56+00:00; +3h02m01s from scanner time.993/tcp open ssl/imap Cyrus imapd|_imap-capabilities: CAPABILITY995/tcp open pop3 Cyrus pop3d3306/tcp open mysql MySQL (unauthorized)4445/tcp open upnotifyp?10000/tcp open http MiniServ 1.570 (Webmin httpd)|_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).Service Info: Hosts: beep.localdomain, 127.0.0.1, example.com
Host script results:|_clock-skew: 3h02m00s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Now we have more than one port open so itâs given us more chances to hack this machine from multiple entry points, but we will work on one of them, just take notes about this output and letâs continueâŚ
Website Enumeration
After opening 10.10.10.7
it redirects us to https://10.10.10.7
and now we have a login portal as you can see here

letâs try to find any entry point here like CMS and it may be vulnerable or something like this, letâs take a look at the source code

Now we have 2 keywords we will search for exploitation related to them elastix
and palosanto.
After searching about palosanto
I didnât find anything so letâs search about elastix
by using searchsploit

As you can see here are multiple exploitation, but we will work on the easiest one âLFIâ and see what it will lead us to, so open the link, and you will find the exploitation code like this

now we have the LFI full link, after accessing it

we have passwords and usernames but itâs hard to read so open the source code and search for password
you will find this password, keep it, for now, we will need it

for now, we have username:root
and the password
which we have found above.
If you remember from nmap
scan thereâs port is open, sossh 22
we will try to login to the server with the credentials we have
ssh root@10.10.10.7
or ssh 10.10.10.7
but at the first, Iâve faced a problem with ssh itself as you can see here and after some search, Iâve found the solution here

After resolving the problem, weâre logged in as root through ssh port :) letâs search for the flagsâŚ
The root flag is in /root
and the user flag is in /home/fanis
Congrats â¤
Stay in touch :)
Last updated