HackTheBox - AdmirerToo

  Рет қаралды 15,594

IppSec

IppSec

Күн бұрын

00:00 - Intro
01:08 - Start of nmap, discovering a webserver and filtered port
04:15 - Discovering a hostname in the 404 not found message in the mailto section
05:25 - Gobuster VHOST Discoery finds the subdomain db.admirer-gallery.htb which is adminer. Playing with the application and raw SQL Commands
07:25 - Trying to write files with INTO OUTFILE, also testing the secure file priv default directory for MySQL which is the most reliable
09:30 - Going to google and finding this version of adminer is vulnerable to a SSRF, but having trouble with this because the login for adminer is different
11:45 - Intercepting the login request, finding a hardcoded password that doesn't really help us
13:00 - Installing adminer in a docker container, so we can play with the application locally which helps us understand the SSRF Exploit
15:30 - Finding a python3 http server redirect example to use for our SSRF
17:00 - Performing the SSRF Vulnerability failing to extract local files
18:10 - The CSRF is annoying, configuring burpsuite to replace variables in our post automatically so we don't need to manually intercept.
20:00 - Having the SSRF access localhost:4242 (the filtered port from nmap), we see the OpenTSDB application, finding an exploit
21:15 - Exploit fails, it complains about an invalid metric. Googling to find OpenTSDB API Documentation and finding an endpoint to list metrics
24:30 - Updating the exploit to use the http.stats.web.hits metric and getting RCE
29:10 - Reverse shell returned
33:40 - Finding database credentials in server.php, which also are jennifers credentials.
36:00 - Enumerating Apache configuration files, discovering one webserver runs as devel
39:20 - Discovering a PHP Object Injection vulnerability in a OpenCats which is a webserver running on localhost, jennifer can login. We can't write to the web directory thoe
42:30 - Discovering devel can write to /usr/local/etc/ and fail2ban is installed, which has an RCE with whois
45:00 - Running strace on whois to discover it looks at /usr/local/etc/whois.conf
47:00 - Using phpgcc to test our file write to see what the file looks like
48:40 - Looking at an example whois configuration file
49:20 - Explaining our payload and doing some weird regex termination to get this to work
50:10 - Looking at the whois source code to see it only reads the first 512 bytes of the configuration file
52:00 - Creating the whois configuration file, which starts with ]* to terminate the regex, then puts 500 spaces to get rid of the appended data by the exploit
55:30 - Creating our payload for the fail2ban whois exploit and getting root

Пікірлер: 26
@panhavorn
@panhavorn 2 жыл бұрын
I can say it's really enjoy to watch your content.
@theremyyoutube5431
@theremyyoutube5431 2 жыл бұрын
That's a fast end ! Really good videos !
@j.stan8916
@j.stan8916 2 жыл бұрын
Great content. For some strange reason when I did this box - the "nc" didn't want to catch the root shell, but only "ncat" worked. I was not sure why that happened since I see you got it with "nc" from the 1st try :)
@darshanakhare6676
@darshanakhare6676 2 жыл бұрын
Nice q&a on htb channel
@rohitsumbrui3374
@rohitsumbrui3374 2 жыл бұрын
The thing i was waiting for
@Cybergh0st_17
@Cybergh0st_17 2 жыл бұрын
Hey, thanks for sharing this one! Will you be releasing a video about your setup of Parrot OS to look like the HTB one?
@FrancescoM-
@FrancescoM- 2 жыл бұрын
very good video
@NVTFT
@NVTFT 2 жыл бұрын
so good chain attack
@StephenOgu
@StephenOgu 2 жыл бұрын
this is interesting
@The_Dark_Cats
@The_Dark_Cats 2 жыл бұрын
I Could not get the very last part to work where it should connect to me on 43 and grab the fail2ban file. I used the walk-through method with printf and after ctrl-c on my nc on port 43, it would kick my root shell back for about one minute and then disconnect me. I am trying to figure out where I messed up... I was still able to read the root flag before it kicks me. Anyway as usual great video, it was very helpful!
@plushplush7635
@plushplush7635 2 жыл бұрын
load_file works rarely cos it is disabled by default in mysql
@GiQQ
@GiQQ 2 жыл бұрын
That's not true.
@plushplush7635
@plushplush7635 2 жыл бұрын
@@GiQQ proof ?
@g-o1882
@g-o1882 2 жыл бұрын
@@plushplush7635 my own machine called Bankrobber. You'll have to use that function, but I've never had to enable it.
@plushplush7635
@plushplush7635 2 жыл бұрын
@@g-o1882 I remember that box, the only one I used it, but mysql or mariadb ?
@ippsec
@ippsec 2 жыл бұрын
It is true, by default you don’t have file priv. Also app armor stops a lot of write locations
@Stranger-bm1bf
@Stranger-bm1bf 2 жыл бұрын
First comment I wanna be hacker tooo Btw I am a teenager I know how to use kali And i love your vids
@vulture6610
@vulture6610 2 жыл бұрын
lol
@plushplush7635
@plushplush7635 2 жыл бұрын
hi stranger welcome in the hacking community, feel free to ask anything
@neunzehnvierundachtzig
@neunzehnvierundachtzig 2 жыл бұрын
💀
@blackmine57
@blackmine57 2 жыл бұрын
And that is an easy box ? Bruh... It was kinda easy before the whois thing...
@DeadAksRab
@DeadAksRab 2 жыл бұрын
no it's a hard box on HTB
@blackmine57
@blackmine57 2 жыл бұрын
@@DeadAksRab My bad ! Sorry !
@santo.bollove
@santo.bollove 2 жыл бұрын
I realized something. If hacker say 'cool, interesting, I love, etc (something down the line)' it's probably bad for you ;)
@AUBCodeII
@AUBCodeII 2 жыл бұрын
The letters of your username can be rearranged into pepsic, cpepsi, pipsec or psicep
HackTheBox - Late
26:05
IppSec
Рет қаралды 22 М.
HackTheBox - Timing
58:12
IppSec
Рет қаралды 16 М.
Sigma Kid Hair #funny #sigma #comedy
00:33
CRAZY GREAPA
Рет қаралды 35 МЛН
New model rc bird unboxing and testing
00:10
Ruhul Shorts
Рет қаралды 25 МЛН
🤔Какой Орган самый длинный ? #shorts
00:42
OpenAI's New SearchGPT Shakes Up the Industry, Google Stock CRASHES!
10:10
HackTheBox - Talkative
1:04:55
IppSec
Рет қаралды 17 М.
HackTheBox - Pandora
1:06:17
IppSec
Рет қаралды 29 М.
The moment we stopped understanding AI [AlexNet]
17:38
Welch Labs
Рет қаралды 789 М.
HackTheBox - Toby
2:06:08
IppSec
Рет қаралды 23 М.
HackTheBox - Secret
49:26
IppSec
Рет қаралды 23 М.
HackTheBox - Devzat
1:02:44
IppSec
Рет қаралды 16 М.
HackTheBox - Pikaboo
42:27
IppSec
Рет қаралды 21 М.
I Built my own Power Supply (don't do it)
11:18
Linus Tech Tips
Рет қаралды 694 М.
Sigma Kid Hair #funny #sigma #comedy
00:33
CRAZY GREAPA
Рет қаралды 35 МЛН