HackTheBox - Bucket
00:00 - Intro
00:57 - Start of nmap discovering the HTTP Site bucket.htb
03:30 - Poking at the website, using the developer console to discover s3.bucket.htb
05:00 - Using curl to view HTTP Headers and discovering amazon
05:30 - Oh god... I forgot to edit the URL in this gobuster! Actually created a feature request in GoBuster to fix this mistake from happening.
05:45 - Installing AWS CLI
06:30 - Using the aws to connect to a custom endpoint, then configure credentials
07:30 - Exploring the S3 Bucket
09:25 - Using S3 to add a reverse shell to the website
11:15 - Reverse Shell returned, spending some time to start taking notes.
16:30 - End of notes, poking around on the terminal to find
19:00 - Discovering some weird ports, checking the apache configuration to see if they are related
20:55 - The Apache mpm_itk_module specifies the site is running as root and not www-data
23:50 - Poking at DynamoDB to get user credentials
26:10 - Doing some jq fu to get exactly the information we want and building a username/password list
30:00 - Explaining extended file attributes and using getfacl to see Roy can access bucket-app
33:30 - Exploring the bucket-app to see it pull information from DynamoDB to build PDF's
35:05 - Using Flameshot to explain exactly what is happening in the code
40:00 - Looking at pd4ml (library used to make PDF) to see we can attach a file
41:45 - Doing a port forward to forward port 8000 back to our box
43:00 - Creating the alerts table in DynamoDB
45:50 - Creating the JSON Document we want to insert into the alert table
48:10 - Using AWS dynamodb --put-item to put the document into the table
49:50 - Creating the PDF and pulling /etc/passwd from the server
52:00 - Because this is java if we fopen a directory, we get a listing, discovering .ssh
53:00 - Pulling the SSH Key
54:22 - Exploring our notes to see what else we wanted to do
56:20 - Showing off the timeline plugin in obsidian
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Virtual Keyboard Login with PingOne Advanced Identity Cloud
Medium · Cybersecurity
Why Businesses Quietly Accept Technology Friction as “Normal”
Medium · Cybersecurity
The Model You Just Downloaded Might Own Your Network — What I Learned Building Defenses Against AI…
Medium · Cybersecurity
I Found Backdoored AI Models on Hugging Face — And So Has Everyone Else Who Bothered to Look
Medium · Cybersecurity
Chapters (28)
Intro
0:57
Start of nmap discovering the HTTP Site bucket.htb
3:30
Poking at the website, using the developer console to discover s3.bucket.htb
5:00
Using curl to view HTTP Headers and discovering amazon
5:30
Oh god... I forgot to edit the URL in this gobuster! Actually created a featur
5:45
Installing AWS CLI
6:30
Using the aws to connect to a custom endpoint, then configure credentials
7:30
Exploring the S3 Bucket
9:25
Using S3 to add a reverse shell to the website
11:15
Reverse Shell returned, spending some time to start taking notes.
16:30
End of notes, poking around on the terminal to find
19:00
Discovering some weird ports, checking the apache configuration to see if they
20:55
The Apache mpm_itk_module specifies the site is running as root and not www-da
23:50
Poking at DynamoDB to get user credentials
26:10
Doing some jq fu to get exactly the information we want and building a usernam
30:00
Explaining extended file attributes and using getfacl to see Roy can access bu
33:30
Exploring the bucket-app to see it pull information from DynamoDB to build PDF
35:05
Using Flameshot to explain exactly what is happening in the code
40:00
Looking at pd4ml (library used to make PDF) to see we can attach a file
41:45
Doing a port forward to forward port 8000 back to our box
43:00
Creating the alerts table in DynamoDB
45:50
Creating the JSON Document we want to insert into the alert table
48:10
Using AWS dynamodb --put-item to put the document into the table
49:50
Creating the PDF and pulling /etc/passwd from the server
52:00
Because this is java if we fopen a directory, we get a listing, discovering .s
53:00
Pulling the SSH Key
54:22
Exploring our notes to see what else we wanted to do
56:20
Showing off the timeline plugin in obsidian
🎓
Tutor Explanation
DeepCamp AI