HTB: Mongod Walkthrough

Writeup — Mongod By Araiz Naqvi

Prepared By Araiz Naqvi.

Overview

- Difficulty: Easy
- Operating System: Linux
- Objective: Capture flag via Mongodb
- Tools Used: nmap, mongosh, openvpn


Nmap Scans

Let’s as usual start with a nmap stealth scan to determine the open ports:

There usually is not a ssh only, there has to be something else from where we can get the usernames and passwords. So, let’s run an all port stealth scan:

As can be seen there’s another port 27017 which is usually used by mongodb.
I now want to service scan it and see what deeper information can I get:
Ahaa! It does look like mongoDB.


Entering into MongoDB

Let’s start by checking whether we’re able to login to the mongosh server itself:

And, we’re in!
I need to look into what databases are open:

To me sensitive_information and users looks very hot!
So, that’s where we’re headed:

Let’s look at what it contains:

This right here is absolute gold! In fact better than gold!
Let’s check out sensitive_information:

 — -
**Prepared by Araiz Naqvi**

Comments

Popular posts from this blog

HTB: Nibbles Walkthrough

HTB: Crocodile Walkthrough

HTB: Cap Walkthrough