Wingdata HackTheBox Writeup - Season10
SUMMARY
This write-up covers the WingFTP machine from HackTheBox Season 10. Initial reconnaissance revealed an HTTP service hosting a virtual host running a WingFTP Server instance vulnerable to CVE-2025-47812, a critical Remote Code Execution vulnerability that granted us an initial foothold as the user wacky.
With access to the system, enumeration of the WingFTP server directory uncovered a salted password hash. Using John the Ripper’s dynamic format mode with the recovered salt, the hash was successfully cracked, revealing wacky’s plaintext password.
Further enumeration exposed a misconfigured sudoers rule granting access to a custom binary, which was leveraged to escalate privileges and achieve full root access.
PATH TO FOLLOW
- Reconnaissance
- Virtual Host Enumeration
- Exploiting WingFTP Server — CVE-2025-47812 (RCE)
- Initial Access
- System Enumeration & Hash Discovery
- Cracking the Salted Hash
- Sudo Misconfiguration Analysis
- Privilege Escalation to Root
CONTENT WILL BE RELEASED ONCE THE MACHINE IS RETIRED