HTB - Dog Machine [help]
by edimirbahia - Sunday March 30, 2025 at 03:06 PM
#1
I'm currently working on the "DOG" box  and I was able to gain a shell as www-data by exploiting Backdrop CMS and uploading a webshell module. From there, I upgraded my shell using Python (pty.spawn("/bin/bash")) and verified that I have basic shell access.

I've already run LinPEAS and Linux Exploit Suggester, which pointed out potential privesc vectors like CVE-2021-4034 (PwnKit), but that led me straight to root. What I'm really trying to figure out now is how to escalate from www-data to the user account that owns the user.txt
flag.


I still can’t seem to find a way to pivot from www-data to the target user.
Any nudges or suggestions would be much appreciated — even just a hint toward what to focus on would help a lot.
Thanks in advance! ?
Reply
#2
where is the file ,git has a username and pasword
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 364 88,787 8 hours ago
Last Post: napo22
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 90 7,532 Yesterday, 05:26 AM
Last Post: dingaghost
  [FREE] HTB-ProLabs APTLABS Just Flags kewlsunny 23 2,353 03-28-2026, 03:30 AM
Last Post: lulaladrow
  HTB Eloquia User and Root Flags - Insane Box 69646B 13 353 03-27-2026, 06:14 PM
Last Post: vlxw
  HTB - ALL Challenges you Stuck in osamy7593 2 651 03-27-2026, 04:24 PM
Last Post: catsweet



 Users browsing this thread: