HackTheBox - Compromised

IppSec · Beginner ·🔐 Cybersecurity ·5y ago
00:00 - Intro 01:30 - Start of nmap, discover web and ssh. Discover litecart, fail to find a way to identify version 03:10 - Running GoBuster to find the backup directory 05:20 - Examining the tar archive 06:30 - Talking about the unix time being 32-bit timestamps but tar did not keep entire timestamp 09:10 - Using find with printf to sort files by modified time 10:30 - Discovering the admin/login.php file was modified to drop the credentials to disk 11:50 - Logging into LiteCart as admin 13:20 - Finding exploits on searchsploit, then manually running through the exploit because its Python2 with some annoying libraries 17:20 - Uploading our PHP Shell but it doesn't work, checking for PHP Disabled functions by using a simple php file. Then doing phpinfo() to see other functions 20:50 - Running through Chankro even thoe it wouldn't work. 23:50 - Uploading large binary files in BURPSUITE by pasting base64 and decoding it within burpsuite 25:33 - Chankro wont work due to putenv being disabled. Looks like there's a PHP 7.0 - 7.4 bypass. Trying this! 28:15 - Attempting a reverse shell but it doesn't work. Viewing iptables configuration 29:45 - Using my Forward Shell script to get a TTY on the box 34:00 - Again, talking about 32-bit timestamps to find files that were put into /lib/ not by a Apt 36:30 - Discovering the PAM Backdoor (pam_unix.so), then reversing it to get a skeleton password 43:30 - BOX COMPLETED. Doing USER/ROOT a different way 45:00 - Generating a Weevely Reverse shell which will let us do more things in PHP 47:00 - Discovering MySQL has a bash shell 49:30 - Discovering the MySQL has a UDF (User Defined Function) that allows for code execution 53:30 - Dropping an SSH Key, then seeing a strace-log.dat file which acts as a keylogger on linux. Also the 32 bit timestamp sticks out 1:00:15 - Discovering a LD_PRELOAD Rootkit (libdate.so),reversing it to see a hidden privesc
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from IppSec · IppSec · 0 of 60

← Previous Next →
1 HHC2016 - Analytics
HHC2016 - Analytics
IppSec
2 HackTheBox - October
HackTheBox - October
IppSec
3 HackTheBox - Arctic
HackTheBox - Arctic
IppSec
4 HackTheBox - Brainfuck
HackTheBox - Brainfuck
IppSec
5 HackTheBox - Bank
HackTheBox - Bank
IppSec
6 HackTheBox - Joker
HackTheBox - Joker
IppSec
7 HackTheBox - Lazy
HackTheBox - Lazy
IppSec
8 Camp CTF 2015 - Bitterman
Camp CTF 2015 - Bitterman
IppSec
9 HackTheBox - Devel
HackTheBox - Devel
IppSec
10 Reversing Malicious Office Document (Macro) Emotet(?)
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
11 HackTheBox - Granny and Grandpa
HackTheBox - Granny and Grandpa
IppSec
12 HackTheBox - Pivoting Update: Granny and Grandpa
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
13 HackTheBox - Optimum
HackTheBox - Optimum
IppSec
14 HackTheBox - Charon
HackTheBox - Charon
IppSec
15 HackTheBox - Sneaky
HackTheBox - Sneaky
IppSec
16 HackTheBox - Holiday
HackTheBox - Holiday
IppSec
17 HackTheBox - Europa
HackTheBox - Europa
IppSec
18 Introduction to tmux
Introduction to tmux
IppSec
19 HackTheBox - Blocky
HackTheBox - Blocky
IppSec
20 HackTheBox - Nineveh
HackTheBox - Nineveh
IppSec
21 HackTheBox - Jail
HackTheBox - Jail
IppSec
22 HackTheBox - Blue
HackTheBox - Blue
IppSec
23 HackTheBox - Calamity
HackTheBox - Calamity
IppSec
24 HackTheBox - Shrek
HackTheBox - Shrek
IppSec
25 HackTheBox - Mirai
HackTheBox - Mirai
IppSec
26 HackTheBox - Shocker
HackTheBox - Shocker
IppSec
27 HackTheBox - Mantis
HackTheBox - Mantis
IppSec
28 HackTheBox - Node
HackTheBox - Node
IppSec
29 HackTheBox - Kotarak
HackTheBox - Kotarak
IppSec
30 HackTheBox - Enterprise
HackTheBox - Enterprise
IppSec
31 HackTheBox - Sense
HackTheBox - Sense
IppSec
32 HackTheBox - Minion
HackTheBox - Minion
IppSec
33 VulnHub - Sokar
VulnHub - Sokar
IppSec
34 VulnHub - Pinkys Palace v2
VulnHub - Pinkys Palace v2
IppSec
35 HackTheBox - Inception
HackTheBox - Inception
IppSec
36 Vulnhub - Trollcave 1.2
Vulnhub - Trollcave 1.2
IppSec
37 HackTheBox - Ariekei
HackTheBox - Ariekei
IppSec
38 HackTheBox - Flux Capacitor
HackTheBox - Flux Capacitor
IppSec
39 HackTheBox - Jeeves
HackTheBox - Jeeves
IppSec
40 HackTheBox - Tally
HackTheBox - Tally
IppSec
41 HackTheBox - CrimeStoppers
HackTheBox - CrimeStoppers
IppSec
42 HackTheBox - Fulcrum
HackTheBox - Fulcrum
IppSec
43 HackTheBox - Chatterbox
HackTheBox - Chatterbox
IppSec
44 HackTheBox - Falafel
HackTheBox - Falafel
IppSec
45 How To Create Empire Modules
How To Create Empire Modules
IppSec
46 HackTheBox - Nightmare
HackTheBox - Nightmare
IppSec
47 HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
48 HackTheBox - Bart
HackTheBox - Bart
IppSec
49 HackTheBox -  Aragog
HackTheBox - Aragog
IppSec
50 HackTheBox - Valentine
HackTheBox - Valentine
IppSec
51 HackTheBox - Silo
HackTheBox - Silo
IppSec
52 HackTheBox - Rabbit
HackTheBox - Rabbit
IppSec
53 HackTheBox - Celestial
HackTheBox - Celestial
IppSec
54 HackTheBox - Stratosphere
HackTheBox - Stratosphere
IppSec
55 HackTheBox - Poison
HackTheBox - Poison
IppSec
56 HackTheBox - Canape
HackTheBox - Canape
IppSec
57 HackTheBox - Olympus
HackTheBox - Olympus
IppSec
58 HackTheBox - Sunday
HackTheBox - Sunday
IppSec
59 HackTheBox - Fighter
HackTheBox - Fighter
IppSec
60 HackTheBox - Bounty
HackTheBox - Bounty
IppSec

Related AI Lessons

HDFC AMC Just Confirmed a Cybersecurity Incident.
HDFC AMC confirms cybersecurity incident after anonymous source claims access to IT systems, highlighting need for robust security measures
Medium · Cybersecurity
BEFORE YOU TOUCH THE TARGET: A PASSIVE AND ACTIVE RECON WALK-THROUGH FOR CYBERSECURITY…
Conduct thorough reconnaissance before exploiting a target to gather crucial information for a successful cybersecurity operation
Medium · Cybersecurity
Virtual Keyboard Login with PingOne Advanced Identity Cloud
Learn how to use a virtual keyboard for secure login with PingOne Advanced Identity Cloud to prevent keylogger attacks
Medium · Cybersecurity
Why Businesses Quietly Accept Technology Friction as “Normal”
Businesses often accept technology friction as normal, but it can have significant impacts on productivity and security
Medium · Cybersecurity

Chapters (23)

Intro
1:30 Start of nmap, discover web and ssh. Discover litecart, fail to find a way to
3:10 Running GoBuster to find the backup directory
5:20 Examining the tar archive
6:30 Talking about the unix time being 32-bit timestamps but tar did not keep entir
9:10 Using find with printf to sort files by modified time
10:30 Discovering the admin/login.php file was modified to drop the credentials to d
11:50 Logging into LiteCart as admin
13:20 Finding exploits on searchsploit, then manually running through the exploit be
17:20 Uploading our PHP Shell but it doesn't work, checking for PHP Disabled functio
20:50 Running through Chankro even thoe it wouldn't work.
23:50 Uploading large binary files in BURPSUITE by pasting base64 and decoding it wi
25:33 Chankro wont work due to putenv being disabled. Looks like there's a PHP 7.0 -
28:15 Attempting a reverse shell but it doesn't work. Viewing iptables configuratio
29:45 Using my Forward Shell script to get a TTY on the box
34:00 Again, talking about 32-bit timestamps to find files that were put into /lib/
36:30 Discovering the PAM Backdoor (pam_unix.so), then reversing it to get a skeleto
43:30 BOX COMPLETED. Doing USER/ROOT a different way
45:00 Generating a Weevely Reverse shell which will let us do more things in PHP
47:00 Discovering MySQL has a bash shell
49:30 Discovering the MySQL has a UDF (User Defined Function) that allows for code e
53:30 Dropping an SSH Key, then seeing a strace-log.dat file which acts as a keylogg
1:00:15 Discovering a LD_PRELOAD Rootkit (libdate.so),reversing it to see a hidden pri
Up next
VPC Service Controls: Day Two Operations
Google Cloud
Watch →