Interpreter is a Linux machine running Mirth Connect, a healthcare integration platform. Initial access exploits an unauthenticated RCE. A PBKDF2 password hash is then extracted from the local MariaDB instance, cracked offline to obtain SSH access. Privilege escalation abuses a Python eval() injection in a root-owned local Flask service, allowing arbitrary file reads including the root flag.
You need to be signed in to access protected stories.
For hints/guidance/requests, you can join our Discord Server
*Following HTB policies, the solutions to live machines will not be shared publicly even on the Discord server.