‘Nothing says love like chemicals’: Valentine’s roses often covered in pesticides, testing finds

Bouquets imported to Europe found to be heavily contaminated, often with chemicals banned in EU and UKStay away from roses this Valentine’s Day, environmental campaigners have warned after testing revealed them to be heavily contaminated with pesticide…

Read More >>

Hack The Box: Soulmate machine walkthrough – Easy Difficulitty

Just completed the Soulmate machine on Hack The Box — rated Easy, but packed with a satisfying vuln chain!
Started with subdomain enumeration → discovered an exposed CrushFTP admin panel on ftp.soulmate.htb. Exploited an unauthenticated API flaw (CVE-2025-31161 style) in the /WebInterface/function/ endpoint to enumerate users and create a backdoor admin account. From there, abused broken access controls in User Manager to reset the “ben” account password. Logged in as “ben” → gained VFS access to /webProd (the main web root), uploaded a PHP webshell → got RCE as www-data with a reverse shell.
Credential reuse let me su ben and grab user.txt

Root came via a backdoored Erlang SSH daemon on localhost:2222 (hardcoded always-true auth, running as root) → trivial escalation to root Eshell and root.txt

Key takeaways: exposed admin panels are goldmines, weak API auth leads to quick takeovers, credential reuse is still everywhere, and custom services with backdoors can hand you root on a platter.
Loved the progression from web misconfig → file write → RCE → local privesc. Solid learning box!

#HackTheBox #HTB #CyberSecurity #PenetrationTesting #CTF #PrivilegeEscalation #RCE #BugBounty #RedTeam

The post Hack The Box: Soulmate machine walkthrough – Easy Difficulitty appeared first on Threatninja.net.

Read More >>