HackTheBox - HackBack
00:00:00 - Intro
00:01:30 - Begin of Recon, discovery of an HTTP API that has a few commands
00:06:00 - Using JQ to parse json output, use NetStat/Proc to find GoPhish
00:15:00 - Logging into GoPhish with default creds admin:gophish, finding DNS Names
00:21:15 - Discovery of Obfuscated JavaScript Deobfuscating it to find a hidden section
00:33:20 - Using wfuzz to bruteforce the password for webadmin.php
00:37:10 - Finding Code Execution in WebAdmin.php
00:44:00 - Creating a Python Script to give a pseudo shell to cat, ls, and upload
01:10:45 - Script finished, uploading reGeorg to create a proxy onto the box to bypass FW
01:16:20 - Using WinRM to access low privilege shell as Simple User
01:25:08 - Exploring /Util/Scripts to find a way to privesc to Hacker
01:30:29 - Exploring GetSystem functionality of meterpreter
01:37:20 - Starting to create program to steal a token from NamedPipe Clients
01:41:00 - Creating XOR Encrypter for payloads in C (There is a bug used & instead of %)
01:48:20 - Using MSFVenom to generate raw payload to XOR then generate in C Format
01:51:38 - Creating the Stager to execute meterpreter, with some fun old AV Evasion tactics
(Testing/Bug Hunting)
02:03:45 - Found the issue, AND'd the payload instead of XOR'd in encrypt.c
02:08:30 - Creating the NamedPipe portion of code
02:28:30 - Creating the Pipe Impersonation part of the code
02:43:16 - Had some weird errors, adding the ability to enable token privileges
(more troubleshooting....)
03:01:00 - Editing the /util/scripts/clean.ini to execute our NamedPipe Creation File
03:06:10 - Meterpreter Session Loaded. Unfortunately it grab the impersonation token, more troubleshooting.
03:08:20 - Found the bug that caused us to not pass the token
03:09:45 - Re-Explaining all the code
03:14:57 - Meterpreter loaded, using incognito to grab our impersonation token for HACKER user
- https://googleprojectzero.blogspot.com/2016/03/exploiting-leaked-thread-handle.html
03:30:15 - Creating a bat file to run Ne
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
Meta has hired five founding members of Mira Murati’s Thinking Machines Lab in a systematic talent raid
The Next Web AI
OrangeQS raises €15M and brings hardware makers into the solution
The Next Web AI
Nobody Wants to Learn AI (They Just Don’t Want to Fall Behind)
Medium · Python
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
Chapters (26)
Intro
1:30
Begin of Recon, discovery of an HTTP API that has a few commands
6:00
Using JQ to parse json output, use NetStat/Proc to find GoPhish
15:00
Logging into GoPhish with default creds admin:gophish, finding DNS Names
21:15
Discovery of Obfuscated JavaScript Deobfuscating it to find a hidden section
33:20
Using wfuzz to bruteforce the password for webadmin.php
37:10
Finding Code Execution in WebAdmin.php
44:00
Creating a Python Script to give a pseudo shell to cat, ls, and upload
1:10:45
Script finished, uploading reGeorg to create a proxy onto the box to bypass FW
1:16:20
Using WinRM to access low privilege shell as Simple User
1:25:08
Exploring /Util/Scripts to find a way to privesc to Hacker
1:30:29
Exploring GetSystem functionality of meterpreter
1:37:20
Starting to create program to steal a token from NamedPipe Clients
1:41:00
Creating XOR Encrypter for payloads in C (There is a bug used & instead of %)
1:48:20
Using MSFVenom to generate raw payload to XOR then generate in C Format
1:51:38
Creating the Stager to execute meterpreter, with some fun old AV Evasion tacti
2:03:45
Found the issue, AND'd the payload instead of XOR'd in encrypt.c
2:08:30
Creating the NamedPipe portion of code
2:28:30
Creating the Pipe Impersonation part of the code
2:43:16
Had some weird errors, adding the ability to enable token privileges
3:01:00
Editing the /util/scripts/clean.ini to execute our NamedPipe Creation File
3:06:10
Meterpreter Session Loaded. Unfortunately it grab the impersonation token, mo
3:08:20
Found the bug that caused us to not pass the token
3:09:45
Re-Explaining all the code
3:14:57
Meterpreter loaded, using incognito to grab our impersonation token for HACKER
3:30:15
Creating a bat file to run Ne
🎓
Tutor Explanation
DeepCamp AI