🎯 Executive Summary
The Browsed machine was compromised by abusing a trusted Chrome extension upload workflow. A malicious extension was uploaded and later installed by a developer, resulting in automatic JavaScript execution on all visited websites. This provided a browser-context SSRF primitive, allowing access to internal services bound to localhost.
The SSRF was used to reach an internal Flask application vulnerable to Bash arithmetic expansion injection, leading to remote command execution and a reverse shell as the user larry. Privilege escalation was achieved via a misconfigured sudo rule allowing execution of a Python tool as root. A world-writable __pycache__ directory enabled Python .pyc cache poisoning, resulting in arbitrary code execution during module import and a root shell.
1. Reconnaissance - Surface Discovery
1.1 Port Scanning
We begin with a full TCP scan to ensure no hidden services are missed.
# Aggressive full-range scan with service detection
rustscan -a 10.10.8.1 --ulimit 5000 -r 1-65535 -- -A -sS -Pn -oA browsed
1.2 Scan Results
22/tcp open ssh syn-ack OpenSSH 9.6p1 Ubuntu (protocol 2.0)
80/tcp open http syn-ack nginx 1.24.0 (Ubuntu)
|_http-title: Browsed
Observations
SSH likely requires credentials
Web server is the main attack surface
Title hints at browser-related functionality
1.3 Host Configuration
During enumeration, multiple virtual hosts are discovered. These must be added locally.
echo "10.10.8.1 browsed.htb browsedinternals.htb" | sudo tee -a /etc/hosts
🔐 PREMIUM WRITEUP - MEMBERSHIP REQUIRED
This machine is still active in HTB, so the full walkthrough, exploitation path, and flags cannot be publicly released.
But you can access the entire premium writeup right now.
🌟 Get Instant Access
Unlock the complete step-by-step solution, techniques used, notes, and exclusive insights by becoming a member.
Why Go Premium?
Early access to full detailed writeups
Passwords for active CTF solutions
Advanced exploitation techniques
Priority help & faster support
Upgrade once - unlock everything instantly.
💬 Need help while solving?
I’ve got your back - reach out anytime:
Email: [email protected]
Keep hacking, keep learning, keep winning. 🎯

