HackTheBox - Toby

  Рет қаралды 23,661

IppSec

IppSec

Күн бұрын

00:00 - Intro
00:50 - Start of nmap
03:30 - Discovering backup.toby.htb and discovering GOGS
07:40 - Discovering a backup project in toby-admin, which is wordpress
09:38 - Downloading and running php malicious file scanner and finding a backdoor in the web code
13:30 - Finding the backdoor in comment.php and finding out its packed a bunch of times. Using a loop to get it back to the original code.
19:00 - Analyzing the depacked malware, to see it will run a function on a specially crafted comment
22:40 - Placing the comment which should trigger the backdoor, then analyzing what happens
23:40 - Wireshark shows the box starts a request on port 20053, listening and discovering it sends us data encryped with our secret
28:20 - Changing the secret to be 00, so it doesn't xor anything making it a bit easier for us to analyze
29:25 - Sending it a command by XOR'ing it with the key the server sends back to us
32:00 - Creating a python script to automate this
40:22 - Reverse shell returned python isn't there so using script to get our regular TTY
42:15 - Looking at /proc to see network information since ifconfig and ip are not on the box
50:20 - Running chisel to setup a proxy back to us
58:00 - Connecting to the MySQL Database to crack wordpress accounts
1:01:10 - Logging into the GOGS instance as toby-admin, downloading personal-webapp source code
1:04:30 - Making the webapp talk initiate a MySQL Connection back to us
1:06:20 - Editing our mysql instance to allow a host, but first we have to reset our mysql root password
1:10:00 - Extracting the SALT + Password from wireshark of MySQL Trying to log into us, figuring out how to convert it so we can crack
1:16:38 - Converting the SALTS to hex, which is what hashcat needs, then trying to crack the mysql password but failing
1:18:35 - Discovering the password used the password generator which is using the epoch time as a seed for random
1:19:30 - Copying the PWGenerator code to create a new wordlist of all potential passwords
1:25:49 - MySQL Password has been cracked, this provides us ssh access to the MySQL Docker container
1:28:17 - Running pspy on the MySQL Container discover an SSH key gets temporarily written
1:30:36 - Writing a loop that runs cat against a file until it exists, then stops to get the SSH Key, which gets us on the host
1:33:20 - Decrypting the SQLite Database we had found earlier
1:39:50 - Hunting for a backdoor on the system by looking at full timestamps, since package managers chop simplify the time, which may make backdoors stick out
1:45:00 - Discovering the a pam library and /etc/.bd file
1:47:00 - Analyzing the pam library in ghidra to discover it allows a BD password to login, but also allows people to bruteforce the backdoor password 1 character at a time
1:53:20 - Explaining how we are going to bruteforce this password
1:56:30 - Creating a shell script to bruteforce the password
2:00:45 - Bruteforcing the password and getting root

Пікірлер: 35
@zer0sa300
@zer0sa300 2 жыл бұрын
from 7.9 billion people around the world, one of the best infosec guy, thank you.
@XiSparks
@XiSparks 2 жыл бұрын
This box is insane. So many different aspects to it. Well done!
@appophiss3890
@appophiss3890 2 жыл бұрын
know what's more insane than the box? that guy doing it
@m35cyberbash33
@m35cyberbash33 2 жыл бұрын
even when i dont understand everything, i enjoy the video , thank you
@hamu.u
@hamu.u 2 жыл бұрын
Spitting facts😂😂😂
@FamilyGuyClipsOfficial
@FamilyGuyClipsOfficial 2 жыл бұрын
i was just waiting for your video
@HackPick
@HackPick 2 жыл бұрын
An amazing piece of content/hacking, highly appreciated! Receive ten times fold for sharing Your skills and knowledge!
@overwatch9659
@overwatch9659 2 жыл бұрын
Thank you for creating this content
@rawgtu
@rawgtu 2 жыл бұрын
Thank you 🙏🏾 amazing content
@dharmbhav
@dharmbhav 2 жыл бұрын
You are a true prodigy
@monKeman495
@monKeman495 2 жыл бұрын
god tier information still floundering
@robbie2044
@robbie2044 2 жыл бұрын
Can't wait to see how you solved it. I was struggling HARD on the middl\end part of the machine it was not even funny. I really got the "rush" when root popped 🤣
@vanahacker6670
@vanahacker6670 2 жыл бұрын
Thanks a lot for your work u are the best
@luv2stack
@luv2stack 2 жыл бұрын
Craaaazy
@BlackHermit
@BlackHermit 2 жыл бұрын
I love MySQL! Thank you so much for this video!
@declanmcardle
@declanmcardle 2 жыл бұрын
You can do something like: $ git grep -i password once you're in a git repository to look for strings with password in it...
@danielstewart9584
@danielstewart9584 2 жыл бұрын
Thank you for sharing this 🙏
@morya8376
@morya8376 2 жыл бұрын
1:03:30 You may use a command like `unzip -l foo.zip | less` to see whether unzipping the file will mess up your current directory or not.
@sand3epyadav
@sand3epyadav 2 жыл бұрын
Nice Video.....!££
@RuneAntonsen
@RuneAntonsen 2 жыл бұрын
FWIW, Cyberchef has a IP function
@BennyM910
@BennyM910 2 жыл бұрын
anybody know how to copy the old pwnbox to your parrot vm?
@kalidsherefuddin
@kalidsherefuddin Жыл бұрын
Ok thanks
@VigneshSahoo
@VigneshSahoo Жыл бұрын
What's the difference between gobuster vhost and gobuster dns?
@ippsec
@ippsec Жыл бұрын
Gobuster DNS uses DNS Requests, Gobuster VHOST edits the virtual host header in the request.
@wkppp4732
@wkppp4732 2 жыл бұрын
Now we know ipp's b-day 🤣
@tg7943
@tg7943 2 жыл бұрын
Push!
@aminhatami3928
@aminhatami3928 2 жыл бұрын
Tnx.what about c2 series?
@defyteryt2452
@defyteryt2452 2 жыл бұрын
Interesting question !
@ippsec
@ippsec 2 жыл бұрын
I don’t see myself continuing the c2 series anytime soon,
@marcog828
@marcog828 2 жыл бұрын
I think that the video already posted is good to get started. Thanks to that video I started creating my c2 in go. As major components I only have the web interface missing. I’m planning to make it open source and available to the community. I would be interested to see in ippsec’s video some creative/opsec way to exchange messages between an agent and the c2 but I understand the risks that this involves.
@snapchatbroccoli
@snapchatbroccoli 2 жыл бұрын
1:49:55 dog!!!
@morya8376
@morya8376 2 жыл бұрын
H4ppy bday, @ippsec! + from a guy behind a NAT
@morya8376
@morya8376 Жыл бұрын
@ippsec, happy birthday! + from a guy in Watermelonsland
HackTheBox - Backdoor
38:24
IppSec
Рет қаралды 75 М.
HackTheBox - Overflow
1:31:42
IppSec
Рет қаралды 18 М.
路飞被小孩吓到了#海贼王#路飞
00:41
路飞与唐舞桐
Рет қаралды 83 МЛН
路飞太过分了,自己游泳。#海贼王#路飞
00:28
路飞与唐舞桐
Рет қаралды 15 МЛН
Пранк пошел не по плану…🥲
00:59
Саша Квашеная
Рет қаралды 6 МЛН
New model rc bird unboxing and testing
00:10
Ruhul Shorts
Рет қаралды 25 МЛН
OpenAI's New SearchGPT Shakes Up the Industry, Google Stock CRASHES!
10:10
HackTheBox - Horizontall
1:04:53
IppSec
Рет қаралды 22 М.
HackTheBox - Pikaboo
42:27
IppSec
Рет қаралды 21 М.
HackTheBox - Napper
1:24:46
IppSec
Рет қаралды 10 М.
Can we dooby Tesco's GU10 bulbs?  - with schematic
10:41
bigclivedotcom
Рет қаралды 62 М.
Want to make a video chat app? Watch this video for WebRTC!
1:22:35
Good Morning Developers
Рет қаралды 27 М.
Java Is Better Than Rust
42:14
ThePrimeTime
Рет қаралды 157 М.
HackTheBox - POV
41:08
IppSec
Рет қаралды 10 М.
HackTheBox - Hancliffe
2:19:39
IppSec
Рет қаралды 19 М.
HackTheBox - Intelligence
49:16
IppSec
Рет қаралды 33 М.
路飞被小孩吓到了#海贼王#路飞
00:41
路飞与唐舞桐
Рет қаралды 83 МЛН