[HTB] Zetta — Write-up

bigb0ss
11 min readFeb 24, 2020

Welcome to the Zetta box writeup! This was a hard-difficulty box and had some multiple steps to fully boot2root on the box. For the initial foothold, we will abuse FXP client to discover the IPv6 address. This will then reveal additional service, rsync, and we will exploit this to gain our user shell. Finally, we will exploit the installed PostgreSQL instance with SQLi attack to escalate our privilege to another user, and with that access, we can…

--

--

bigb0ss

OSWE | OSCE | OSCP | CREST | Lead Offensive Security Engineer — All about Penetration Test, Red Team, Cloud Security, Web Application Security