{"id":624,"date":"2026-02-06T17:11:25","date_gmt":"2026-02-06T17:11:25","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=624"},"modified":"2026-02-06T17:11:26","modified_gmt":"2026-02-06T17:11:26","slug":"buff-hackthebox-lab","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=624","title":{"rendered":"Buff- Hackthebox lab"},"content":{"rendered":"\n<p>I began the assessment by performing an Nmap port scan to identify open services on the target machine. The scan revealed that port <strong>8080<\/strong> was open, hosting a web service with the intriguing HTTP title: <strong>\u201cmrb3n&#8217;s Bro Hut.\u201d<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"856\" height=\"312\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-33.png\" alt=\"\" class=\"wp-image-625\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-33.png 856w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-33-300x109.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-33-768x280.png 768w\" sizes=\"auto, (max-width: 856px) 100vw, 856px\" \/><\/figure>\n\n\n\n<p>Next, I began enumerating the web application to identify potential vulnerabilities. The site appeared to be a gym services platform, and during enumeration I discovered that it was running <strong>Gym Management Software version 1.0<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"781\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-34-1024x781.png\" alt=\"\" class=\"wp-image-626\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-34-1024x781.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-34-300x229.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-34-768x586.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-34.png 1270w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"378\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-35.png\" alt=\"\" class=\"wp-image-627\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-35.png 757w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-35-300x150.png 300w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/figure>\n\n\n\n<p>While researching the identified software version, I discovered a publicly available exploit on GitHub targeting <strong>Gym Management Software 1.0<\/strong>. The exploit demonstrated an <strong>unauthenticated remote code execution (RCE)<\/strong> vulnerability, which could potentially allow an attacker to execute arbitrary commands on the target system without requiring valid credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"990\" height=\"985\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-36.png\" alt=\"\" class=\"wp-image-628\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-36.png 990w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-36-300x298.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-36-150x150.png 150w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-36-768x764.png 768w\" sizes=\"auto, (max-width: 990px) 100vw, 990px\" \/><\/figure>\n\n\n\n<p>I executed the exploit against the target, and it completed successfully, granting me a <strong>Meterpreter shell<\/strong> on the system. This confirmed that the remote code execution vulnerability was exploitable and provided an initial foothold on the machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"934\" height=\"307\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-38.png\" alt=\"\" class=\"wp-image-630\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-38.png 934w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-38-300x99.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-38-768x252.png 768w\" sizes=\"auto, (max-width: 934px) 100vw, 934px\" \/><\/figure>\n\n\n\n<p>The Meterpreter shell proved to be unstable and unreliable for further interaction. To obtain a more stable session, I transferred <strong>Netcat<\/strong> to the target system and used it to establish a reverse shell, which provided improved command execution and better overall control.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"103\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-39-1024x103.png\" alt=\"\" class=\"wp-image-632\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-39-1024x103.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-39-300x30.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-39-768x77.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-39.png 1214w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"434\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-40-1024x434.png\" alt=\"\" class=\"wp-image-633\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-40-1024x434.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-40-300x127.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-40-768x325.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-40.png 1086w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Next, I transferred <strong>WinPEAS<\/strong> to the target system and executed it to enumerate potential privilege escalation vectors. While analyzing the output, I identified a <strong>CloudMe<\/strong> process running locally and listening on port <strong>8888<\/strong>, which appeared to be a potential avenue for further investigation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"418\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-41-1024x418.png\" alt=\"\" class=\"wp-image-634\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-41-1024x418.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-41-300x123.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-41-768x314.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-41-1536x627.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-41-2048x837.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I proceeded to search for known vulnerabilities related to <strong>CloudMe<\/strong> using <strong>Searchsploit<\/strong>. The search returned several promising results, indicating the presence of publicly available exploits that could potentially be leveraged for privilege escalation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"232\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-42-1024x232.png\" alt=\"\" class=\"wp-image-635\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-42-1024x232.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-42-300x68.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-42-768x174.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-42-1536x348.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-42.png 1555w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I selected the <strong>CloudMe 1.11.2 \u2013 Buffer Overflow (PoC)<\/strong> exploit and modified the included shellcode, replacing it with payload generated from my Meterpreter configuration so that the reverse shell would connect back to my attack machine. This allowed me to leverage the vulnerability for privilege escalation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-43.png\" alt=\"\" class=\"wp-image-637\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-43.png 640w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-43-300x225.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>To interact with the locally bound service, I transferred <strong>Chisel<\/strong> to the target machine and established a reverse port forward. This allowed me to access the internal service running on port <strong>8888<\/strong> from my attacker machine, enabling further exploitation of the CloudMe application.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"974\" height=\"153\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-44.png\" alt=\"\" class=\"wp-image-638\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-44.png 974w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-44-300x47.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-44-768x121.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"221\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-45.png\" alt=\"\" class=\"wp-image-639\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-45.png 801w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-45-300x83.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-45-768x212.png 768w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/figure>\n\n\n\n<p>With the port forwarding in place, I executed the exploit against the exposed service. The attack succeeded as expected, returning a shell with <strong>Administrator-level privileges<\/strong>, thereby completing the privilege escalation phase.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"572\" height=\"249\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-46.png\" alt=\"\" class=\"wp-image-640\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-46.png 572w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-46-300x131.png 300w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><\/figure>\n\n\n\n<p>This machine demonstrated the importance of thorough enumeration and careful analysis of exposed services. Initial access was obtained through an <strong>unauthenticated remote code execution<\/strong> vulnerability in Gym Management Software, highlighting the risks of running outdated and unpatched web applications.<\/p>\n\n\n\n<p>Privilege escalation was achieved by identifying a vulnerable <strong>CloudMe<\/strong> service running locally, combined with port forwarding to access the internal service and exploit a buffer overflow vulnerability. This reinforced how locally bound services and insecure software can present critical escalation paths when proper system hardening is not in place.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I began the assessment by performing an Nmap port scan to identify open services on the target machine. The scan revealed that port 8080 was open, hosting a web service with the intriguing HTTP title: \u201cmrb3n&#8217;s Bro Hut.\u201d Next, I began enumerating the web application to identify potential vulnerabilities. The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=624"}],"version-history":[{"count":4,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/624\/revisions"}],"predecessor-version":[{"id":643,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/624\/revisions\/643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/media\/642"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}