Browsed to `http://facts.htb` - normal homepage with no obvious vulnerabilities on the main page.
facts.htbnmap -sC -sV -p- facts.htb -oN nmap_scan.txt
| Port | State | Service | Version |
|---|---|---|---|
| 22/tcp | Open | SSH | OpenSSH |
| 80/tcp | Open | HTTP | Nginx (serving factsapp) |
Browsed to http://facts.htb - normal homepage with no obvious vulnerabilities on the main page.
Discovered endpoints:
/admin - Admin login page/admin/media/download_private_file?file=... - File download functionalityCritical finding: The download endpoint accepts a user-controlled file parameter, indicating a potential Local File Inclusion (LFI) vulnerability.
Contact me on Discord or LinkedIn for the password.
Contact on DiscordHackTheBox policy restricts publishing walkthroughs for active-season machines. This writeup is password-protected to respect that policy while keeping the content available to those who already have access.