Shoppy writeup by evyatar9

Read my writeup for Shoppy machine on:

TL;DR

User 1: By utilizing NoSQL Injection, login authentication is bypassed. By searching for a user, the hash of josh is found and cracked. Using these credentials, access is gained to mattermost.shoppy.htb. On mattermost, the credentials for the user jaeger are discovered and used for SSH login.

User 2: By running the command sudo -l, it is determined that the binary password-manager can be run as the user deploy. By reversing the binary, the binary’s authentication password is found and it is discovered that the binary prints the credentials of the deploy user.

Root: Through the use of Docker container escape, restricted environments are bypassed and an interactive system shell is spawned, providing root access to the machine.