HackTheBox - Nineveh

  Рет қаралды 49,307

IppSec

IppSec

Күн бұрын

00:00 - Intro
01:58 - Begin Recon (NMAP)
04:19 - GoBuster HTTP + HTTPS
06:35 - Accessing Pages
07:05 - Using Hydra against HTTP + HTTPS Web Forms
11:30 - Logging into HTTP and hunting for vulns
17:00 - Second Hydra attempt against HTTPS
17:57 - Logging into HTTPS (phpLiteAdmin)
20:17 - Chaining Exploits to get Code Execution
26:38 - Reverse Shell Returned
28:00 - LinEnum.sh Script Review
31:30 - Watching for new Processes
37:00 - Found the error in script :)
39:30 - Getting reverse root shell
41:51 - Intended Route to get User
46:12 - Reviewing Knockd configuration
49:33 - Doing the PortKnock

Пікірлер: 92
@erno1978
@erno1978 3 жыл бұрын
IppSec: it's really amazing how you create this stuff. I have no clue if I'll make it the next time I'm trying the OSCP exam, but you are really a master in explaining stuff while you're doing it. Hands-down the best training material. Thanks (also applies for all your other vids, I'm not really a KZbinr, but you're in my top-1-most-watched channels) ;-)
@m3lk0r83
@m3lk0r83 6 жыл бұрын
Your vids are easily the best resource for learning i've found, aside from actually working on vms etc. Learnt so much from these, much obliged! From a junior pentester about to sit the OSCP :)
@momusau642
@momusau642 4 жыл бұрын
The Yellow King did you take your OSCP?
@grandmakisses9973
@grandmakisses9973 3 жыл бұрын
@@momusau642 did you take ur OSCP
@rickjames3034
@rickjames3034 3 жыл бұрын
Well???? We're waiting!!
@m3lk0r83
@m3lk0r83 3 жыл бұрын
@@rickjames3034 lmao, yes I took it years ago and passed
@AUBCodeII
@AUBCodeII 2 жыл бұрын
@@m3lk0r83 Congrats! XDDDDDDDDDDDD!
@davehouser1
@davehouser1 3 жыл бұрын
Thank you for this post. I tried following all the other guides to get the reverse shell, yours was the only one I could get working.
@Locrand
@Locrand 6 жыл бұрын
Awesome video IppSec! Port knocking order was also in a mail at /var/mail/amrois :-)
@TheCryptonian
@TheCryptonian 4 жыл бұрын
I've improved more in the last 2 weeks from going through your videos than I did during 60 days of PWK labs. Exam in 2 weeks and, if I pass, massive credit would go to you!
@rayaanhussain7279
@rayaanhussain7279 3 жыл бұрын
@Alexandru Cucea how did yours go ?
@rayaanhussain7279
@rayaanhussain7279 3 жыл бұрын
@Alexandru Cucea Thats awesome ! . Congratulations man . Ive been doing hackthebox for about a month now . I guess I'll do the OSCP like boxes on hackthebox before i jump on the pwk labs . Its always about the enumeration Once you get a foothold , it gets easier. Do you recommend i take virtual hacking labs before i jump in to PWK ? Do you think I should spend a few more months on hackthebox before going in?
@rayaanhussain7279
@rayaanhussain7279 3 жыл бұрын
@Alexandru Cucea Thank you . I've just realized that I have no experience with buffer overflows or windows boxes. I'm going to stick with hackthebox and other resources for a while before I go in . Just do not want to rush the process and fail miserably :) . I really want to get into this awesome field of penetration testing .Even if I do pass the OSCP by rushing through , its going to come back and bite me in the future. Thank you for the advice my friend . Cheers!
@sebastian93921
@sebastian93921 3 жыл бұрын
I failed the exam :( I will do more boxes before paid for a reexam next time
@TheCryptonian
@TheCryptonian 3 жыл бұрын
@Alexandru Cucea Sorry just seen this! I passed :) how did you get on??
@frankkesel7252
@frankkesel7252 6 жыл бұрын
Super appreciate as usual... Been looking for a way to spot cron / proccess . Love the proc mon ..... Definitely going in my tool box
@SonOfABeach1997
@SonOfABeach1997 3 жыл бұрын
Check out pspy, that's a good tool for it
@rehahliaamine6790
@rehahliaamine6790 6 жыл бұрын
keep going ur the best from algeria
@glasgOWned
@glasgOWned 6 жыл бұрын
I love your videos. I've just gotten into pentesting as a hobby and I've learned a lot through these. Do you run Kali through a VM? That's what I've been doing, but I recently got a new laptop and wanted to try usb booting. However I'm having a horrible time getting it to recognize my gpu (e.g., hashcat). So I was just interested in hearing how you've set things up.
@ippsec
@ippsec 6 жыл бұрын
I do it from a VM. Don't really see a need to go baremetal, have a separate box for the cracking and such wouldn't want to do it on my main box as it tends to slow everything down. I dork around enough with stuff in kali, being able to revert to snapshot is a nice safety net. Additionally, some commercial tools are Windows only so need to be running VM's anyways.
@tabnaka
@tabnaka 6 жыл бұрын
Awesome videos! But can you increase that fonts of your terminal and web browser to make things easier to view for those watching on mobile devices, please?
@flatericy
@flatericy 4 жыл бұрын
great stuff as always
@dylanmakowski1070
@dylanmakowski1070 6 жыл бұрын
Seems like when I don't name the db or table with the keywords "nineveh" and "Notes" it give the "Note not found" error. So it maybe be looking for both strings in order to LFI
@klaboem0
@klaboem0 6 жыл бұрын
Hey @IppSec great video m8, just a quick question: will you be doing vids on the Sans HH challenge 2017? Cheers and have a good day
@ippsec
@ippsec 6 жыл бұрын
I did not do the Holiday Hack this year, so I doubt I’ll put out any videos on it. That being said I’ll probably tweet all the videos I come across, few people did them last year.
@Urbancorax2
@Urbancorax2 4 жыл бұрын
you're a LEGEND!
@issaitani7360
@issaitani7360 4 жыл бұрын
thanks ippsec! there is a hint for the ports that should be knocked in /var/mail/
@0xstephon
@0xstephon 6 жыл бұрын
@ippsec where can i get a copy of the shells?
@salluc1712
@salluc1712 3 жыл бұрын
oh my god that's awesome thank you so much
@grandmakisses9973
@grandmakisses9973 3 жыл бұрын
Ur awesome
@eamonmulholland3159
@eamonmulholland3159 4 жыл бұрын
I know this is an old vid so I’m necroposting here, but I’m pretty sure this box is pronounced “nin-ehva” not “nine-va” since it’s a reference to the ancient Assyrian city in the Bible whose destruction Jonah was sent to foretell. At 31:20 you can see there’s a file in /var/www/html called “ninevehdestruction.jpg” which supports the idea that this is a reference to that city. Just bringing it up because sometimes understanding the references helps with the solution of CTF boxes.
@intellectualgravy9796
@intellectualgravy9796 4 жыл бұрын
Oh. I get it. There is also a German TV show on Netflix called Dark. It has somewhat of a similar plot as well.
@lmfao69420
@lmfao69420 Жыл бұрын
"What you guys are referring to as Linux, is in fact, GNU/Linux..."
@glasgOWned
@glasgOWned 6 жыл бұрын
If you change the "ps -eo command" to "ps -eo user,command" in the procmon script, you'll be able to see which user the command is running as
@ippsec
@ippsec 6 жыл бұрын
Good call.
@xandercage740
@xandercage740 6 жыл бұрын
Hey @ippsec and other folks, why did he directly jumped to hydra when he saw the login page. I meant, how would i know when to use sql injections and when to just brute force it ?? So please, if someone can explain to me the scenarios where looking at the login page i should check for sql injection or brute force it
@ippsec
@ippsec 6 жыл бұрын
Should always try everything -- I just don't show all my enumeration very time because it's very repetitive and would make almost every video over an hour long. The video isn't the very first time I've done the machine, so I know the path prior to recording. Think I say it in the video, but the method I used for user when the box was initially released got patched.
@Tea20024
@Tea20024 Ай бұрын
one question why was command exeucted as &cmd= instead of the usual ?cmd= ???
@cosminbordea1958
@cosminbordea1958 6 жыл бұрын
hey man , big fan here.Do you have an idea about where can i read to perform my skills and my knowledge about penetration testing ?
@ippsec
@ippsec 6 жыл бұрын
Unfortunately, not really. Anything within Starch Press, "Hackers Handbook", or "Hacking Exposed" series. Outside of that just pick up books in technologies you want to learn. Doesn't have to be geared towards hacking.
@cosminbordea1958
@cosminbordea1958 6 жыл бұрын
By the way , i had respected you on hack the box , i am new on it . I had a view on your bloods and challanges and i think you are a legend.i apreciate that you make videos for the retired machines .
@user-vo1vr1hq5z
@user-vo1vr1hq5z 6 жыл бұрын
A lot of new stuff I have learned with you. Thank you. Also had gaps with quotes, but could not understand the issue completely. Few clauses want to add: * manual view of processes (how I did) `top -d 1 -o %CPU` * there is knock tool, could be used as `knock 10.10.10.43 571 290 911 && ssh -i amrois-pk.key -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no amrois@10.10.10.43` (anyway your way was great, on a sockets level) * www.exploit-db.com/exploits/38775/ -- msf module for LPE, could be done with meterpreter session * cat /var/mail/amrois (short tip, that we faced with port knocking) * strings /var/www/ssl/secure_notes/nineveh.png (for a quick view, without right extracting)
@annymous4515
@annymous4515 6 жыл бұрын
Thanks bro
@petrovasyka8
@petrovasyka8 Жыл бұрын
Can I use nc to do port knocking trick?
@yagiztasbag5539
@yagiztasbag5539 6 жыл бұрын
the first login panel can be bypassed with setting the name as admin and sending the password as an array. if i remember correctly the hardcoded password was hinted in the comments of the login page.
@ippsec
@ippsec 6 жыл бұрын
Yeah You are correct. Missed the TypeConfusion vuln, good find!
@MrPakeryoko
@MrPakeryoko 6 жыл бұрын
how could we use that one ?
@vikp8817
@vikp8817 5 жыл бұрын
You are amazing!!! How bout starting classes to teach pentesting to beginners...What burp suite course do you suggest?
@ippsec
@ippsec 5 жыл бұрын
Courses take a ton of time and it isn’t really fun to create super beginner content. Most of these videos I try to use tools/methods/etc that are new to me. This way the videos benefit me too, which makes it worthwhile. Unfortunately, I’ve never taken a burpsuite course so don’t know a good one
@MultiStraik
@MultiStraik 6 жыл бұрын
is there a tmux-shortcut for sending panes to windows?
@ippsec
@ippsec 6 жыл бұрын
Not by default, check out my intro to tmux video -- covers pretty much everything i did.
@hamzakhiate1767
@hamzakhiate1767 6 жыл бұрын
Hello IppSec , could you please giv us some informations about your rig ( crackmachine ) ? the number of GPU the graphic cards ?? i'm trying to build one , thanks :)
@ippsec
@ippsec 6 жыл бұрын
I'd recommend checking the Hashcat Forums for that type of information but in reality, no reason to copy people's build you can mix cards. Don't just blindly buy hardware, make sure you do something to verify it will be profitable.
@hamzakhiate1767
@hamzakhiate1767 6 жыл бұрын
i will check that , thank you again for your vidéos , you do a great job
@lmfao69420
@lmfao69420 Жыл бұрын
I like this box. Basically, if you don't do enough enumeration, it punishes you by making you do more work :P. although, I took the "long" path and honestly I learned more doing that so 👍
@vishnurajkvraj
@vishnurajkvraj 6 жыл бұрын
thanks :)
@shayberkovich8104
@shayberkovich8104 3 жыл бұрын
There is actually a working kernel exploit for this box now. Published just around the time this video was released.
@simerpreetsingh6765
@simerpreetsingh6765 6 жыл бұрын
how long does it usually take for you to exploit these machines for the first time?
@ippsec
@ippsec 6 жыл бұрын
Depends on the machine. This one was under 15 minutes but did it in an unintended way.
@simerpreetsingh6765
@simerpreetsingh6765 6 жыл бұрын
IppSec Thank you for the videos! learning a lot.
@user-vo1vr1hq5z
@user-vo1vr1hq5z 6 жыл бұрын
So, I hope you will help us to do the same! =) And what is your average time for pwning the boxes? And what is the hardest box you faced with ?
@ZerkerEOD
@ZerkerEOD 3 жыл бұрын
Hey IppSec, running into an issue. Doing this box for OSCP prac. I am at the video around 24:30 mark when you are moving the Post parameter around. I can't get mine to work like you have. I HAVE to have it `POST /department/manage.php?notes=/ninevehNotes/../var/tmp/hack.php` if I try to make it like yours and replicate it with `POST /department/manage.php?notes=/var/tmp/hack.php` I get nothing. Not even No note selected error
@ippsec
@ippsec 3 жыл бұрын
I'm guessing the very end of your request does not have a line break.... Go to the very bottom right of your your request and hit enter than try again
@ZerkerEOD
@ZerkerEOD 3 жыл бұрын
@@ippsec That didn't do it. I used the same $_REQUEST except I use zer for the key instead of ipp. it works until I do the change request method. Then I can't get it to work like you do. I don't know what is going on. I reset the box and it was worse. I then did the Change Request Method a couple times tring it and it finally worked, even though it's exactly the same request that wasn't working. I think this is going to confuse me. I also did not have a line break but right now it is working without it and if I add it after the zer=ls it fails.
@ZerkerEOD
@ZerkerEOD 3 жыл бұрын
@@ippsec And to make it worse I can't get portknocking to work. I typed out what you have and 22 stays filtered, the only difference that I can see is I have nmap 7.91 installed but I don't know why that would make a difference EDIT: I have tried your way, I have tried using knockd and knocking, I have also tried using telnet. They will not open 22 for me no matter what. I have asked for help on the hack the box discord
@bugeyemonster
@bugeyemonster 4 жыл бұрын
nice video thanks
@lIlIllll1
@lIlIllll1 3 жыл бұрын
Does anyone know what the "ipp=" mean? I know when he adds the "ls" parameter after the ipp= it provides a directory list, but how did he know to use "ipp="?
@elquesobandito6331
@elquesobandito6331 3 жыл бұрын
the "ipp=" is just a url parameter, the line in the php exploit: $_REQUEST["ipp"] is why the "ipp" parameter works in this case. If you change the php code to something like $_REQUEST["newparam"] you would use "newparam=" instead
@lIlIllll1
@lIlIllll1 3 жыл бұрын
@@elquesobandito6331 that makes sense. Thanks man!
@elquesobandito6331
@elquesobandito6331 3 жыл бұрын
@@lIlIllll1 no problem, happy hacking!
@kushalrahatkar4568
@kushalrahatkar4568 3 жыл бұрын
i am not getting the LFI and m fked up.
@thepinkestmoon
@thepinkestmoon 3 жыл бұрын
the way you pronounce ninevah tells me you didn't watch veggie tales as a kid
@lmfao69420
@lmfao69420 Жыл бұрын
he's obviously not a good Christian boy 😡
@zicada7661
@zicada7661 6 жыл бұрын
Ecscape eh. It's unlike a programmer to deliberately spell a word incorrectly ;)
@kalidsherefuddin
@kalidsherefuddin Жыл бұрын
Ok thanks
@lmfao69420
@lmfao69420 Жыл бұрын
lol.
@km0x905
@km0x905 6 жыл бұрын
😚😙😚😙😚😙
@cnrk1832
@cnrk1832 4 ай бұрын
2024
@jt1731
@jt1731 6 жыл бұрын
nc -z 10.10.10.43 571 290 911
@Hashghost21
@Hashghost21 6 ай бұрын
In this box something is not clear I know it is old but someone help me here between 20:38 to 22:10 Ippsec was dealing with DB and renamed it to ninevehNotes but this name is pre defined in the box and if someone actually put another name it wont work like if the name is /var/tmp/shell.php it wont work I wonder how he knew that path.
@ippsec
@ippsec 6 ай бұрын
I glanced at the video, at 14:00 we see the app loading ninevehNotes. Pretty sure I'm just overwriting that file.
@Hashghost21
@Hashghost21 6 ай бұрын
Yeah, I had to check again and got it thanks.@@ippsec
HackTheBox - Tartarsauce
50:01
IppSec
Рет қаралды 30 М.
HackTheBox - Nibbles
35:35
IppSec
Рет қаралды 101 М.
Задержи дыхание дольше всех!
00:42
Аришнев
Рет қаралды 3,3 МЛН
아이스크림으로 체감되는 요즘 물가
00:16
진영민yeongmin
Рет қаралды 62 МЛН
Heartwarming Unity at School Event #shorts
00:19
Fabiosa Stories
Рет қаралды 22 МЛН
The Most Underrated 3D Printing Filament!
28:03
CNC Kitchen
Рет қаралды 7 М.
OpenAI's New SearchGPT Shakes Up the Industry, Google Stock CRASHES!
10:10
HackTheBox - Crafty
26:17
IppSec
Рет қаралды 11 М.
Physicists Have Proven That the Universe Does Not Exist!
11:01
TheSimplySpace
Рет қаралды 9 М.
HackTheBox - Hawk
1:05:10
IppSec
Рет қаралды 22 М.
HackTheBox - Bastard
39:34
IppSec
Рет қаралды 64 М.
HackTheBox - Active
30:42
IppSec
Рет қаралды 129 М.
HackTheBox - Popcorn
26:12
IppSec
Рет қаралды 237 М.
HackTheBox - Bart
1:41:28
IppSec
Рет қаралды 32 М.
HackTheBox - Monitored
1:02:07
IppSec
Рет қаралды 10 М.
Задержи дыхание дольше всех!
00:42
Аришнев
Рет қаралды 3,3 МЛН