HackTheBox - Acute
00:00 - Intro
01:00 - Start of nmap, the Server Header changes based upon DNS
04:00 - Navigating to the website, discovering the "New Starter Form" which has some key information like a welcome password and username convention
07:00 - Password spraying the Powershell Web Access (PSWA), discovering a valid credential but wrong host, word document had another host which is valid for edavies
09:15 - Playing around in the PSWA
10:00 - Looking at hidden files, discovering c:\utils\desktop.ini which states its a directory that is excluded by AV
12:00 - Making the mistake of running WinPEAS inside the PSWA
14:45 - Setting up ConPtyShell to get a proper PTY reverse shell on windows
15:40 - Making some light modifications to ConPtyShell in order to evade antivirus
16:50 - Getting the ConPtyShell and showing the colors/tab autocomplete
19:30 - Running WinPEAS to show another user is logged on (and the AV Exclusions)
21:55 - Switching to Metasploit, because it makes it easier to migrate into an interactive process, which allows us access to view the desktop of the logged in user
24:30 - Using Screenshot and Screenshare inside of meterpreter to record the screen and get a password that was typed onto a terminal (imonks)
29:00 - Creating a credential object with imonks, so we can Invoke-Command on the domain controller
31:00 - When specifying the correct configurationname our enter-pssession fails because we can't run measure-object. Running Get-Command and Get-Alias to view what commands we can run
35:00 - Discovering wm.ps1, which we can modify to get a shell as jmorgan on our desktop
40:00 - Creating a powershell one-liner to replace a string in a file with cat and set-content
44:40 - Screwed up our fail because of a random line break. Playing around with it until we can fix it.
47:30 - Shell returned as JMorgan, dumping the SAM/SYSTEM files and cracking local passwords on the workstation
58:30 - Looking at other Domain Users, attempting to password spray the users we don't
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: AI Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Linux kernel flaw opens root-only files to unprivileged users
The Register
JWT vs Session Cookies vs PASETO: I Pen-Tested All Three. One Fell in 12 Minutes.
Medium · Cybersecurity
OpenClaw’s 512 Vulnerabilities: A Technical Breakdown
Dev.to · NexGenData
How to check your Windows PC for expiring security certificates - a big one ends in June
ZDNet
Chapters (20)
Intro
1:00
Start of nmap, the Server Header changes based upon DNS
4:00
Navigating to the website, discovering the "New Starter Form" which has some k
7:00
Password spraying the Powershell Web Access (PSWA), discovering a valid creden
9:15
Playing around in the PSWA
10:00
Looking at hidden files, discovering c:\utils\desktop.ini which states its a d
12:00
Making the mistake of running WinPEAS inside the PSWA
14:45
Setting up ConPtyShell to get a proper PTY reverse shell on windows
15:40
Making some light modifications to ConPtyShell in order to evade antivirus
16:50
Getting the ConPtyShell and showing the colors/tab autocomplete
19:30
Running WinPEAS to show another user is logged on (and the AV Exclusions)
21:55
Switching to Metasploit, because it makes it easier to migrate into an interac
24:30
Using Screenshot and Screenshare inside of meterpreter to record the screen an
29:00
Creating a credential object with imonks, so we can Invoke-Command on the doma
31:00
When specifying the correct configurationname our enter-pssession fails becaus
35:00
Discovering wm.ps1, which we can modify to get a shell as jmorgan on our deskt
40:00
Creating a powershell one-liner to replace a string in a file with cat and set
44:40
Screwed up our fail because of a random line break. Playing around with it un
47:30
Shell returned as JMorgan, dumping the SAM/SYSTEM files and cracking local pas
58:30
Looking at other Domain Users, attempting to password spray the users we don't
🎓
Tutor Explanation
DeepCamp AI