HTB: Mongod Walkthrough

Prepared By Araiz Naqvi.
Overview
- Difficulty: Easy
- Operating System: Linux
- Objective: Capture flag via Mongodb
- Tools Used: nmap
, mongosh
, openvpn
Nmap Scans
Let’s as usual start with a nmap stealth scan to determine the open ports:

There usually is not a ssh
only, there has to be something else from where we can get the usernames and passwords. So, let’s run an all port stealth scan:

As can be seen there’s another port 27017
which is usually used by mongodb
.
I now want to service scan it and see what deeper information can I get:
Ahaa! It does look like mongoDB.

Entering into MongoDB
Let’s start by checking whether we’re able to login to the mongosh
server itself:

And, we’re in!
I need to look into what databases are open:

To me sensitive_information
and users
looks very hot!
So, that’s where we’re headed:

Let’s look at what it contains:

This right here is absolute gold! In fact better than gold!
Let’s check out sensitive_information
:

— -
**Prepared by Araiz Naqvi**
Comments
Post a Comment