Web


Nmap discovered an known service on the target port 8065 While it is unclear what type of service that it is running, the scanned fingerprint shows that it is a web server

Webroot this is a login page and it’s hosting a mattermost instance mattermost is an open-source messaging and collaboration platform designed for teams to communicate and work together in real-time. It offers features such as channels, direct messages, file sharing, and integration with other tools. Mattermost can be self-hosted or cloud-hosted and is highly customizable to meet the specific needs of different organizations.

Earlier, it was specifically noted that users with the @delivery.htb address is able to access the Mattermost instance.

I initially attempted to create a testing account, test@delivery.htb, through the support center by osTicket and it seemed to have failed as the account required confirmation I also realized that a temporary email address gets assigned to a ticket. So I have several email addresses ending with @deivery.htb at disposal. Some are restricted and some aren’t

Sign-up


Attempting to sign-up with the initial testing account; test@delivery.htb

Signing-up requires the account confirmation as well Since I am unable to access the inbox of the test@delivery.htb account, I won’t be able to verify it just like the support center by osTicket

However, I remember that I was given a temporary email address for the ticket that I opened; 9321453@delivery.htb I was then able to authenticate to the support center by osTicket as the “Guest User” account

Then, I was presented to a communication platform where I tested for XSS. That just might be functioning as inbox. I should check that.

For that, I signed-up to the Mattermost instance again, using the email address that I was assigned for opening a ticket; 9321453@delivery.htb

Same thing here. It’s asking for email verification.

Back to the support center by osTicket. In the communication platform or “inbox”, I can see that the verification email actually came through. It contains the verification URL.

Navigating to the verification URL successfully verifies the email and completes the sign-up process I should now be able to sign-in to the Mattermost instance

Sign-in


Signing-in

I am then presented with a prompt to join a team There apparently is a team, Internal I will jump right in

This must be the chat for the Internal team I see that the root user has sent 2 messages;

  • while the first message contains a cleartext credential; maildeliverer: Youve_G0t_Mail!, it also advises avoiding password reuse for those that are a variant of PleaseSubscribe!
  • The second message points out that the password above isn’t present in the rockyou.txt file, but can be cracked through hashcat

That is some valuable information. I should test out the credential