Writeup by wook413

Recon

Nmap

As usual, I began by running three Nmap scans. The first was a comprehensive TCP scan of all 65,535 ports to identify open ports. The second scan focused on service detection and fingerprinting for those identified ports, while the third covered the top 10 UDP ports.

Initial Access

HTTP 80 8080

HTTP 80

Port 80 only hosted a default nginx page. I attempted directory brute-forcing using gobuster , but it yielded no results.

image-20260210221209725

HTTP 8080

I found a NodeBB service running on port 8080. Running gobuster here was more successful, returning several interesting directories.

image-20260210221216903

Redis 6379

Before diving deeper into port 8080, I moved on to port 6379, where Redis was active. The server appeared to be misconfigured, allowing authentication without a username or password, which enabled me to run the info command.

I attempted the redis-rogue-server exploit, which I discovered through HackTricks and downloaded from the following repository: https://github.com/n0b0dyCN/redis-rogue-server

Initially, I opted for an interactive shell. However, for some reason, I was unable to cd into the /root directory when the whoami command revealed that I am indeed root .

I restarted the exploit and chose a reverse shell instead of the interactive one. This worked perfectly and granted me a full root shell.

Shell as root

Found proof.txt