HackTheBox - Meta
00:00 - Introduction
00:55 - Start of nmap
03:10 - Running a VHOST enumeration scan
04:00 - Discovering the Metaview application which is an image upload
04:50 - Attempting to exploit the file upload, uploading non images.
07:00 - Editing the exif metadata to put PHP tags in the image, still failing to get code execution but find XSS
09:00 - Looking for public exploits against exiftool
10:10 - Creating a malicious image with CVE-2021-22204 against ExifTool, DjVu exploit
15:00 - Reverse shell returned, examining the application
18:30 - Discovering Convert_images directory, using grep to find out if anything uses it and finding a script
20:30 - Finding the convert_images script uses an old copy of mogrify which uses image magic and has a vulnerability
21:30 - Exploiting CVE-2020-29599 in mogrify/image magic
28:50 - Our user can run neofetch with sudo, and XDG_CONFIG_HOME is preserved. Exploiting it by putting a malicious config
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
How Modern Anti-Bot Systems Detect Automation Before HTML Loads
Dev.to · Annabelle
Best Proxy Providers for Businesses and Developers
Medium · Cybersecurity
SOC as a Service: A Smarter Approach to Cybersecurity
Medium · Cybersecurity
Can You Be Hacked in Just 5 Minutes? - NareshIT
Medium · Cybersecurity
Chapters (13)
Introduction
0:55
Start of nmap
3:10
Running a VHOST enumeration scan
4:00
Discovering the Metaview application which is an image upload
4:50
Attempting to exploit the file upload, uploading non images.
7:00
Editing the exif metadata to put PHP tags in the image, still failing to get c
9:00
Looking for public exploits against exiftool
10:10
Creating a malicious image with CVE-2021-22204 against ExifTool, DjVu exploit
15:00
Reverse shell returned, examining the application
18:30
Discovering Convert_images directory, using grep to find out if anything uses
20:30
Finding the convert_images script uses an old copy of mogrify which uses image
21:30
Exploiting CVE-2020-29599 in mogrify/image magic
28:50
Our user can run neofetch with sudo, and XDG_CONFIG_HOME is preserved. Exploit
🎓
Tutor Explanation
DeepCamp AI