HackTheBox - Caption
** See Pinned Comment for Root Shell.
00:00 - Introduction
01:00 - Start of nmap
03:40 - If you want to learn more about Varnish check out Forgot
04:00 - Looking at the Git Repo, discovering the Infra stack HAProxy, Varnish, Flask
08:45 - Discovering Margo's password in an old commit
10:00 - Testing if we can put a line break in the URL to bypass HAProxy's ACL (like in Skyfall)
12:04 - Using H2CSmuggler to use an HTTP2 upgrade to bypass the HAproxy ACL
16:50 - Poisoning the cache and placing an XSS Payload in the UTM_Source Tracker
23:30 - Got an Admin Cookie, using it to access the logs page via h2csmuggler
27:45 - Looking at the logs, showing there's an ecdsa key that margo uses
29:45 - Googling the URL we downloaded the logs from discovering its copyparty which has a file disclosure exploit
33:00 - Having a hard time enumerating what user is running copyparty, guessing each user and finding an SSH Key
36:00 - Looking at the custom LogService binary which is an Apache Thrift service
40:30 - Creating a go program to make an Apache Thrift Request
46:50 - Creating our payload that will perform the command injection. See pinned comment if you have problems here.
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
I Managed WordPress Security Across 1500+ Clients. The Main Reason WP Sites Get Hacked.
Dev.to AI
What Is YubiKey Authentication & How It Works
Dev.to · Mrunank Pawar
I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Medium · Data Science
I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Medium · Programming
Chapters (15)
Introduction
1:00
Start of nmap
3:40
If you want to learn more about Varnish check out Forgot
4:00
Looking at the Git Repo, discovering the Infra stack HAProxy, Varnish, Flask
8:45
Discovering Margo's password in an old commit
10:00
Testing if we can put a line break in the URL to bypass HAProxy's ACL (like in
12:04
Using H2CSmuggler to use an HTTP2 upgrade to bypass the HAproxy ACL
16:50
Poisoning the cache and placing an XSS Payload in the UTM_Source Tracker
23:30
Got an Admin Cookie, using it to access the logs page via h2csmuggler
27:45
Looking at the logs, showing there's an ecdsa key that margo uses
29:45
Googling the URL we downloaded the logs from discovering its copyparty which h
33:00
Having a hard time enumerating what user is running copyparty, guessing each u
36:00
Looking at the custom LogService binary which is an Apache Thrift service
40:30
Creating a go program to make an Apache Thrift Request
46:50
Creating our payload that will perform the command injection. See pinned comme
🎓
Tutor Explanation
DeepCamp AI