HTB Browsed

Overview

DifficultyMedium
OSLinux
Release Date·
StatusActive

Browsed is a HackTheBox machine that presents an interesting challenge focusing on web application security and enumeration techniques. This walkthrough covers the initial reconnaissance, vulnerability discovery, and exploitation path for this machine.

Attack Summary

This boxx involved an end-to-end attack chain that began with basic network and web service enumeration, leading to the discovery of an exposed development-grade web application that incorrectly trusted uploaded browser extension content. By modifying a sample extension’s JavaScript, attacker-controlled code was executed client-side and used to interact with an internal-only backend routine, resulting in command execution and a reverse shell as a low-privileged user.

Post-exploitation access was stabilised by pulling an exposed SSH private key, enabling direct SSH login without reliance on the original exploit. Privilege escalation was achieved by abusing a NOPASSWD sudo-permitted Python tool that relied on world-writable Python bytecode; poisoning the .pyc cache allowed execution flow hijacking while preserving file size and timestamps, ultimately resulting in root-level code execution.

MITRE ATT&CK Mapping

TacticTechnique IDTechnique Name
DiscoveryT1046Network Service Discovery
Initial AccessT1190Exploit Public-Facing Application
ExecutionT1059Command and Scripting Interpreter (JavaScript, Unix Shell)
Credential AccessT1552.004Unsecured Credentials – Private Keys
Privilege EscalationT1548.003Abuse Elevation Control Mechanism: Sudo
Persistence / Defense EvasionT1574.001Hijack Execution Flow: DLL Side-Loading / Code Cache Poisoning
Privilege EscalationT1068Exploitation for Privilege Escalation
🔒

Locked Content as per HTB Policy

The detailed walkthrough content for this machine has been restricted in accordance with HackTheBox’s content sharing policy. This ensures that the learning experience remains fair for all users and maintains the integrity of the platform’s challenges.