Cybersecurity Videos
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityVideosHackTheBox - Guardian
Cybersecurity

HackTheBox - Guardian

•February 28, 2026
0
IppSec
IppSec•Feb 28, 2026

Why It Matters

The chain of low‑level misconfigurations and unpatched libraries illustrates how incremental oversights can culminate in complete host compromise, underscoring the need for holistic security hygiene in web applications and infrastructure.

Key Takeaways

  • •Default credentials exposed via PDF
  • •Gitea public API leaks usernames
  • •PHP Spreadsheet XSS enabled document weaponization
  • •LFI + filter chain granted shell access
  • •Apache Include + symlink achieved root file read

Pulse Analysis

In modern penetration testing, the initial phase often hinges on thorough reconnaissance. The "Guardian" scenario began with an nmap sweep and DNS enumeration that uncovered a hidden sub‑domain, portal.guardian.htb. A publicly accessible PDF contained the default password "GU1234," highlighting the danger of exposing credential artifacts. By automating brute‑force attempts with FFUF, the testers quickly gained footholds across multiple accounts, a reminder that weak default passwords remain a prevalent attack vector across enterprise environments.

Once inside, the attackers pivoted to application‑level flaws. The chat module’s inadequate access controls allowed enumeration of admin messages, leading to the discovery of a Gitea instance. Gitea’s public API inadvertently confirmed user existence, facilitating targeted credential attacks. Further analysis of the portal’s source code revealed a PHP Spreadsheet XSS vulnerability, which was weaponized via a custom Python script to steal session cookies. Subsequent CSRF exploitation created privileged accounts, while a local file inclusion (LFI) combined with a filter‑chain bypass delivered a remote shell, enabling database extraction and hash cracking. These layered exploits demonstrate how a single vulnerable component can cascade into full system takeover.

The final escalation leveraged misconfigured Apache directives. By manipulating the Include directive and creating symbolic links, the team extracted arbitrary file contents, then crafted a minimal Apache configuration that ran the web server with root privileges. This granted unrestricted file system access and highlighted the critical risk of running services with elevated privileges. For security teams, the "Guardian" walkthrough reinforces the importance of regular credential rotation, strict API exposure policies, timely patching of third‑party libraries, and least‑privilege service configurations to mitigate similar multi‑stage attacks.

Original Description

00:00 - Introduction
00:52 - Start of nmap
03:00 - Discovering the portal.guardian.htb sub domain, there is a PDF here that shows the default password. Failing to enumerate valid accounts.
06:00 - Using FFUF to Bruteforce all accounts with the default password of GU1234
10:25 - Logging into the application, doing some quick notes of what functionality is exposed
14:25 - Identifying the Chat Functionality, attempting to see if there are broken access controls letting us read other users messages with ffuf
17:30 - Looking at the chats to admin, discovering a Gitea Password then finding the Gitea sub domain
22:00 - Doing some light enumeration against Gitea showing the Public API will let us enumerate if a user exists
24:45 - Logging in as Jamil and then downloading the portal source code and running it through Snyk
28:00 - Looking into the PHP Spreadsheet XSS Vulnerability and creating a python script to weaponize a document
35:20 - Stole the teachers cookie, switching our cookie and finding an CSRF Vulnerability
38:15 - Creating a quick CSRF Payload to add users
48:40 - Logged in as our newly created admin, exploiting the LFI Vulnerability with the Synactiv Filter Chain Vulnerability
55:15 - Got a shell on the box, dumping the database
58:30 - Identifying the hash, failing to crack it, realize its salted, finding the salt and cracking
1:06:10 - Logged in as Jamil, we can run a python script as Mark. We have write permission over a portion of the script allowing for RCE
1:08:45 - Mark can run SafeApache2CTL which is a custom wrapper, creating an apache module to show RCE
1:17:40 - Playing around with the binary, opening it up in Ghidra to show what it does and how weak the checks are
1:23:30 - Showing that using the Apache Include directive with a SymLink we can leak the first line of any file
1:25:10 - Showing copying the existing apache config and modifying it to just serve files out of /, this lets us grab entire files
1:34:30 - Showing a minimal apache config that will let us run apache as root to serve files
0

Comments

Want to join the conversation?

Loading comments...