HackTheBox - Coder

  Рет қаралды 15,371

IppSec

IppSec

Күн бұрын

00:00 - Introduction
01:00 - Start of nmap
03:30 - Exploring the file share
07:15 - Finding Encrypter.exe, which is a dotnet encrypter. Discovering the seed is based upon time, modifying it to decrypt using metadata from the encrypted file to get the seed.
15:30 - The encrypted file was a Keepass Database, looking into it and seeing credentials and a uthenticator backup
19:45 - Installing the "Authenticator" app and seeing the backup format is the same
21:30 - Explaining why we want to just bruteforce AES vs Argon2id
25:50 - Creating a program in javascript to bruteforce the AES by decrypting and examining the contents of what was decrypted
40:40 - Cracking program done, then logging into TeamCity
45:45 - We can't modify the files on TeamCity but we can use the personal build, supply a dif and get it to execute code that way
49:50 - Defender blocked nishang reverse shell, doing some quick obfuscation to bypass defender and get a shell
55:50 - Discovering Teamcity keeps track of personal builds, looking at old ones and discovering powershell credentials. Decrypting the Secure String to get e.black's password
1:08:00 - Running the bloodhound python collector in a Docker
1:17:40 - Writing a bloodhound query to show Organization Units in active directory, then using Get-ACL to see unique privileges to each OU
1:24:15 - Explaining the attack path, e.blake can manipulate ADCS, s.blade can add machines to a specific OU. We can create a vulnerable ADCS Template and exploit this with Certifried
1:31:30 - Creating and publishing the Vulnerable Certificate. Cloning computer, then modifying msPKI-Enrollment-Flag
1:53:30 - Doing an easier vulnerable template, to make this box vulnerable to ESC1. Set msPKI-Enrollment-Flag, msPKI-Certificate-Name-Flag,

Пікірлер: 24
@Darquirrin
@Darquirrin 7 ай бұрын
Love the video and how Ipp kept jumping between Black and Blake ;) So cool, keep up the great work.
@AUBCodeII
@AUBCodeII 7 ай бұрын
Maybe the real Ipp was the friends we made along the way
@SimonHuenecke
@SimonHuenecke 7 ай бұрын
love how this video makes it seem, that programming javascript was the main reason for the box to be ranked "insane"
@AUBCodeII
@AUBCodeII 7 ай бұрын
Merry Christmas, Ippy
@ahmedmoustafa3186
@ahmedmoustafa3186 7 ай бұрын
Amazing ❤
@dadamnmayne
@dadamnmayne 7 ай бұрын
3:46 Anonymous logon. Anonymous logon is common in enterprise setups. Otherwise, users would need to reauthenticate everytime they access a file share. The best approach for smb is File Based Access controls.
@dadamnmayne
@dadamnmayne 7 ай бұрын
@@turningaround7842 💯
@AUBCodeII
@AUBCodeII 6 ай бұрын
1:04:53 you don't have to upload enc.txt and key.key to the target to get e.black's password. I corrected the enc.txt file and ran the exact same lines of code you did on my machine and it worked just fine. But it was nice to learn some Git commands :)
@kalidsherefuddin
@kalidsherefuddin 7 ай бұрын
The great course
@mutabixherbert6197
@mutabixherbert6197 7 ай бұрын
Nice work
@Nobody2day553
@Nobody2day553 7 ай бұрын
Do you have a video showing how to setup a "kraken" machine?
@allurbase
@allurbase 7 ай бұрын
Leaving the wrong code in makes it more likely that copilot would hallucinate, for future reference.
@pugglecorn1085
@pugglecorn1085 7 ай бұрын
Sonya Blade, Erron Black, Jax :) _Mortal Kombat!!!_
@user-cb5yk4gk9u
@user-cb5yk4gk9u 7 ай бұрын
love your content ! can you see how many language you learned
@BroodPitt
@BroodPitt 7 ай бұрын
Wasn't it called a smb null session? 😅
@ippsec
@ippsec 7 ай бұрын
Null session is no username too
@BroodPitt
@BroodPitt 7 ай бұрын
@@ippsec 😞
@ClinicalDepression420
@ClinicalDepression420 7 ай бұрын
Does anyone else hear the 'Um hmm' in the background?
@tg7943
@tg7943 6 ай бұрын
Push!
@eyephpmyadmin6988
@eyephpmyadmin6988 7 ай бұрын
You should do a video on doing a bug bounty whwre the scope is so big, its hard finding a place to consider going deep on
@ippsec
@ippsec 7 ай бұрын
I would not go deep in bug bounty, it’s rarely profitable. Look for shallow, automated it and scan
@RISE_BEFORE_YOU_DIE
@RISE_BEFORE_YOU_DIE 7 ай бұрын
Its Illegal On KZbin.. "HACKING REASON" Bcuz Attacking Real Host
@6locc6a6y_fps
@6locc6a6y_fps 6 ай бұрын
30:00 😂
@sotecluxan4221
@sotecluxan4221 7 ай бұрын
Have a great Xmas and a happy '24!
⚒️ Working full-time in open-source
4:49:59
HeyAndras
Рет қаралды 368
Packer | PicoCTF | Reverse Engineering | The Hacker's Room
6:51
The Hacker's Room
Рет қаралды 21
УГАДАЙ ГДЕ ПРАВИЛЬНЫЙ ЦВЕТ?😱
00:14
МЯТНАЯ ФАНТА
Рет қаралды 4,2 МЛН
Sigma Kid Hair #funny #sigma #comedy
00:33
CRAZY GREAPA
Рет қаралды 35 МЛН
A teacher captured the cutest moment at the nursery #shorts
00:33
Fabiosa Stories
Рет қаралды 31 МЛН
Amazing weight loss transformation !! 😱😱
00:24
Tibo InShape
Рет қаралды 58 МЛН
HackTheBox   Zipping
1:02:06
IppSec
Рет қаралды 11 М.
HackTheBox - Napper
1:24:46
IppSec
Рет қаралды 10 М.
Intro to the Zig Programming Language • Andrew Kelley • GOTO 2022
50:14
UEFI bootloader: everybody loves parsing
27:54
Falcon Code
Рет қаралды 109
HackTheBox - Cerberus
1:11:56
IppSec
Рет қаралды 18 М.
HackTheBox - Monitored
1:02:07
IppSec
Рет қаралды 10 М.
HackTheBox - Bookworm
2:05:30
IppSec
Рет қаралды 13 М.
HackTheBox - Bizness
32:16
IppSec
Рет қаралды 13 М.
УГАДАЙ ГДЕ ПРАВИЛЬНЫЙ ЦВЕТ?😱
00:14
МЯТНАЯ ФАНТА
Рет қаралды 4,2 МЛН