HackTheBox - Phoenix
00:00 - Intro
01:00 - Start of nmap
02:22 - Taking a look at the SSL Certificates and website to find blog/forum
04:57 - Running WPScan, explaining why i like aggressive scanning
09:00 - Finding public vulnerability in Asgaros Forms (Blind Time Based SQLi)
10:45 - Running SQLMap to confirm the injection
21:00 - Examining the Wordpress Database structure, so we can run SQLMap to dump very specific things
25:20 - Cracking wordpress credentials to find out we can't use any because of MFA
30:10 - Using our SQL Injection to dump a list of activated plugins in wordpress
32:00 - Finding an exploit in the Download From Files plugin, converting it to ignore SSL Validation Errors
35:45 - Uploading a malicious phtml (php) file to get a shell on the box
41:00 - Examining how MFA is enabled on SSH/SU by looking at PAM files
42:10 - Discovering the 10.11.12.13 network can bypass MFA, which our host is on.
45:10 - Using find to show files created between two dates
48:20 - Discovering backups are created in /backups and explaining why we cannot view other users processes (hidepid)
48:50 - Looking in the */local/bin directories to discover an obfuscated shell script (sh.x)
51:30 - Running the script and then examining the /proc/pid directory to find the shell script unobfuscated in the cmdline
52:50 - Explaining wildcard injection
56:00 - Exploiting the wildcard injection in rsync
57:30 - Showing how we could of used the SQL Injection to leak all the secrets in the MFA Plugin and generate our own codes
59:10 - Looking at the MiniOrange MFA Source Code, the uninstall.php shows a lot of good information
1:03:45 - Showing how to do a "pretty print" or format output better in a MySQL Command (using \G instead of ;)
1:06:45 - Failing to generate a QR Code that we can use google authenticator to login with
1:12:44 - Going back to the source code to find another way to generate MFA Codes
1:15:45 - Fixing our generator script to decrypt the secret which we can paste to oauthtool and get a M
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June
Forbes Innovation
My AI Security Runtime Burned Through Credits Faster Than the Vulnerabilities
Medium · DevOps
Hackers stole fingerprints and medical data from 1.8 million people in NYC’s largest public hospital breach
The Next Web AI
When AI Helped Write a Real Zero-Day, It Wasn’t ChatGPT
Medium · Cybersecurity
Chapters (25)
Intro
1:00
Start of nmap
2:22
Taking a look at the SSL Certificates and website to find blog/forum
4:57
Running WPScan, explaining why i like aggressive scanning
9:00
Finding public vulnerability in Asgaros Forms (Blind Time Based SQLi)
10:45
Running SQLMap to confirm the injection
21:00
Examining the Wordpress Database structure, so we can run SQLMap to dump very
25:20
Cracking wordpress credentials to find out we can't use any because of MFA
30:10
Using our SQL Injection to dump a list of activated plugins in wordpress
32:00
Finding an exploit in the Download From Files plugin, converting it to ignore
35:45
Uploading a malicious phtml (php) file to get a shell on the box
41:00
Examining how MFA is enabled on SSH/SU by looking at PAM files
42:10
Discovering the 10.11.12.13 network can bypass MFA, which our host is on.
45:10
Using find to show files created between two dates
48:20
Discovering backups are created in /backups and explaining why we cannot view
48:50
Looking in the */local/bin directories to discover an obfuscated shell script
51:30
Running the script and then examining the /proc/pid directory to find the shel
52:50
Explaining wildcard injection
56:00
Exploiting the wildcard injection in rsync
57:30
Showing how we could of used the SQL Injection to leak all the secrets in the
59:10
Looking at the MiniOrange MFA Source Code, the uninstall.php shows a lot of go
1:03:45
Showing how to do a "pretty print" or format output better in a MySQL Command
1:06:45
Failing to generate a QR Code that we can use google authenticator to login wi
1:12:44
Going back to the source code to find another way to generate MFA Codes
1:15:45
Fixing our generator script to decrypt the secret which we can paste to oautht
🎓
Tutor Explanation
DeepCamp AI