HackTheBox - Cerberus

  Рет қаралды 17,861

IppSec

IppSec

Күн бұрын

00:00 - Introduction
01:00 - Start of nmap
02:00 - Looking at the TTL of Ping to see its 127, then making a request to the webserver and seeing it is 62
03:45 - Showing DNS is listening on Cerberos and exposing the 172.16.22.0/24 network
05:15 - Looking at Icinga, testing default credentials
06:20 - Fingerprinting the Icinga release by looking at javascript, using UI.JS since it looks like it changes frequently
09:05 - Cloning the repo, then writing a one-liner to hash all versions of ui.js and finding which commit the version off the webserver is on
12:10 - Finding a File Disclosure vulnerability in Icinga CVE-2022-24716, leaking some Icinga configuration files and finding a web users password
16:20 - Gaining RCE via CVE-2022-24715, which allows us to write a file to disk then change where the Icinga plugin directory is to get code execution
25:30 - Shell as www-data, doing some basic recon to figure out what type of virtual environment we are in via /sys/class/dmi/id/sys_vendor
29:00 - Looking at running processes and seeing sssd is running which allows this box to talk to the domain
30:00 - Looking at SetUID Files, discovering FireJail and privesc'ing CVE-2022-31214
36:00 - As root on linux, we can now examine the SSSD configuration and get a domain password
44:50 - Setting up a SOCKS Proxy via chisel, so we can use Evil-WINRM to log into the windows machine as Matthew
48:50 - Discovering ManageEngine ADSelfService Plus is running, finding an exploit
52:50 - Fighting with Chisel to get all the port forwards working, have trouble with two socks proxies
01:00:00 - Redoing our tunnels, doing a portforward on linux to get evil-winrm, then a socks on our windows target to access ManageEngine
1:06:10 - Running the Metasploit Exploit against ManageEngine and getting root

Пікірлер: 30
@muhamadazim1678
@muhamadazim1678 11 ай бұрын
For me I really like u spend more time screwing and fixing around when an error happen.. it’ll give us more thing to learn.. keep it up 👍👍
@meshelishaool8808
@meshelishaool8808 11 ай бұрын
I learn a lot from the video specially the tunneling, and I loved the "Get the version of the web application" part.
@moonlessiguana1826
@moonlessiguana1826 11 ай бұрын
Please don't stop making your videos!! We love you and your content
@ThaLiquidEdit
@ThaLiquidEdit 11 ай бұрын
I like this for loop with git commits finding ui.js commit hash! Very useful!
@TheExcetto
@TheExcetto 11 ай бұрын
As someone who's begining to learn Your knowledge is impressive Learnt loads Keep it up 😁
@0xKalbani
@0xKalbani 11 ай бұрын
Thanks for the great walkthrough. For the tunneling issue, the issue was that you can not have two socks proxy listening in same port (1080) using chisel or other tools. You can here forward the socks connection to other port from chisel by running the command: ‘./chisel client ip:port R:socks:1081’.
@ekadani5335
@ekadani5335 11 ай бұрын
I couldn't get the socks proxy to work with your command, but if I place the port in the middle, then the socks proxy will work. The command is: `./chisel client ip:port R:1081:socks`.
@boogieman97
@boogieman97 11 ай бұрын
Awesome as always!
@AUBCodeII
@AUBCodeII 11 ай бұрын
Ippenheimer
@obscurus4103
@obscurus4103 11 ай бұрын
lmao
@MoxResearcher
@MoxResearcher 11 ай бұрын
Ipp is the BOMB
@govil1000
@govil1000 11 ай бұрын
finding version using js files thats nice man
@illusionsingh
@illusionsingh 11 ай бұрын
Amazing box After a long time
@monKeman495
@monKeman495 11 ай бұрын
25:07 holy shit the greatest feeling ever
@maixicek
@maixicek 11 ай бұрын
Really good job ipp 👍
@tobao6455
@tobao6455 9 ай бұрын
love it man
@snowden-IT
@snowden-IT 11 ай бұрын
Thank you my frined❤❤❤❤❤
@faanross
@faanross 5 ай бұрын
first time attempting a difficult box - sweating buckets.
@michaelakandi
@michaelakandi 4 ай бұрын
Amazing
@LNA0x963
@LNA0x963 11 ай бұрын
very usefull👍
@BogdanDolia
@BogdanDolia 11 ай бұрын
nice 👍
@tg7943
@tg7943 11 ай бұрын
Push!
@huntit4578
@huntit4578 11 ай бұрын
How does your burp contain big text like i increased font size and it only increased tabs font size not data in repeater tab
@vanshagrawal3056
@vanshagrawal3056 11 ай бұрын
a bit late ig but you can increase the font size in inspector and message editor tab under settings
@sand3epyadav
@sand3epyadav 11 ай бұрын
I got lots of errors during snyk?
@sreyanchakravarty7694
@sreyanchakravarty7694 11 ай бұрын
First
@yajirushik2871
@yajirushik2871 11 ай бұрын
Idk what's that, captain?
@y.vinitsky6452
@y.vinitsky6452 11 ай бұрын
hey @ippsec just wondering have you been able to get openvpn 3 client to work with HTB?
HackTheBox - Busqueda
29:53
IppSec
Рет қаралды 18 М.
HackTheBox - OnlyForYou
45:16
IppSec
Рет қаралды 14 М.
🤔Какой Орган самый длинный ? #shorts
00:42
Пробую самое сладкое вещество во Вселенной
00:41
Wait for the last one! 👀
00:28
Josh Horton
Рет қаралды 152 МЛН
ОСКАР ИСПОРТИЛ ДЖОНИ ЖИЗНЬ 😢 @lenta_com
01:01
HackTheBox - Devvortex
41:00
IppSec
Рет қаралды 11 М.
This web UI for Ansible is so damn useful!
20:07
Christian Lempa
Рет қаралды 460 М.
Precious - HackTheBox (HTB)
45:48
Odyssey
Рет қаралды 336
HackTheBox   Zipping
1:02:06
IppSec
Рет қаралды 11 М.
Redis за 20 минут
23:22
suchkov tech
Рет қаралды 108 М.
HackTheBox - Broker
29:03
IppSec
Рет қаралды 25 М.
Getting Started with Hack The Box
8:33
The Cyber Mentor
Рет қаралды 24 М.
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 121 М.
HTB CPTS Review
14:02
OvergrownCarrot1 Hacking
Рет қаралды 4,1 М.
HackTheBox - Bookworm
2:05:30
IppSec
Рет қаралды 13 М.
🤔Какой Орган самый длинный ? #shorts
00:42