Backfire Walkthrough
Nmap Scan Performed a detailed enumeration of the target using Nmap:
nmap -sVC -v3 backfire.htb Discovered Ports:
22/tcp - OpenSSH 9.2p1 443/tcp - nginx 1.22.1 with self-signed certificate 8000/tcp - nginx 1.22.1 serving directory listing Initial Access Reconnaissance Browsing to http://backfire.htb:8000/ revealed two files:
disable_tls.patch havoc.yaotl disable_tls.patch indicates TLS has been disabled on the Havoc Teamserver WebSocket (port 40056), exposing it for potential exploitation.
Havoc C2 SSRF Exploit Using a public exploit for Havoc C2: