HackTheBox - Pikatwoo

IppSec · Beginner ·🔐 Cybersecurity ·2y ago
00:00 - Introduction 01:00 - Start of nmap 03:15 - Identifying all the technologies used in the box 10:45 - Looking at OpenStack Keystone Authentication and discovering CVE-2021-38155 12:15 - Pulling up API DOCS to see how to login to Keystone, then testing lockout 14:00 - Taking the Burpsuite Request, sending it to FFUF and using a trick to try each password multiple times 25:30 - Attempting to access Swift as a vendor to bypass auth, using GoBuster and discovering an Android directory with Pokatmon app in it 35:10 - Start of analyzing the Pokatmon App, examining DNS, setting up a MITM with Burpsuite and Socat 40:15 - Using Frida to disable TLS Certificate Pinning on Flutter 45:20 - Discovering the App Signs every request, grabbing the certificate out of the app, and signing our own request 49:20 - Performing an SQL Injection, getting an email address then looking for vulnerabilities in Forgot Password on the main website 58:48 - Discovering CVE-2021-43557 in APISIX, which gives us an idea to URLEncode Paths to bypass blacklists and gaining access to the /private/ directory which has a /forgot-password we can use to reset Roger's password 1:04:45 - Logging into the docs, gaining access to the API and finding an LFI 1:09:45 - Looking into CVE-2021-35368, which is a ModSecurity Bypass that allows us to abuse the LFI 1:18:10 - Using NGINX's temporary files with our PHP LFI to gain code execution 1:27:55 - Shell returned on Pokatdex-API, exporting Kubernetes secrets 1:34:20 - Discovering an APISIX admin key and exploiting this service by creating a route that executes code 1:59:20 - Shell returned on the APISIX box, discovering credentials we can SSH with 2:11:10 - Explioting the CRI-O with Kubernetes to set a kernel param to execute a script when a core dump is created (CVE-2022-0811)
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from IppSec · IppSec · 0 of 60

← Previous Next →
1 HHC2016 - Analytics
HHC2016 - Analytics
IppSec
2 HackTheBox - October
HackTheBox - October
IppSec
3 HackTheBox - Arctic
HackTheBox - Arctic
IppSec
4 HackTheBox - Brainfuck
HackTheBox - Brainfuck
IppSec
5 HackTheBox - Bank
HackTheBox - Bank
IppSec
6 HackTheBox - Joker
HackTheBox - Joker
IppSec
7 HackTheBox - Lazy
HackTheBox - Lazy
IppSec
8 Camp CTF 2015 - Bitterman
Camp CTF 2015 - Bitterman
IppSec
9 HackTheBox - Devel
HackTheBox - Devel
IppSec
10 Reversing Malicious Office Document (Macro) Emotet(?)
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
11 HackTheBox - Granny and Grandpa
HackTheBox - Granny and Grandpa
IppSec
12 HackTheBox - Pivoting Update: Granny and Grandpa
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
13 HackTheBox - Optimum
HackTheBox - Optimum
IppSec
14 HackTheBox - Charon
HackTheBox - Charon
IppSec
15 HackTheBox - Sneaky
HackTheBox - Sneaky
IppSec
16 HackTheBox - Holiday
HackTheBox - Holiday
IppSec
17 HackTheBox - Europa
HackTheBox - Europa
IppSec
18 Introduction to tmux
Introduction to tmux
IppSec
19 HackTheBox - Blocky
HackTheBox - Blocky
IppSec
20 HackTheBox - Nineveh
HackTheBox - Nineveh
IppSec
21 HackTheBox - Jail
HackTheBox - Jail
IppSec
22 HackTheBox - Blue
HackTheBox - Blue
IppSec
23 HackTheBox - Calamity
HackTheBox - Calamity
IppSec
24 HackTheBox - Shrek
HackTheBox - Shrek
IppSec
25 HackTheBox - Mirai
HackTheBox - Mirai
IppSec
26 HackTheBox - Shocker
HackTheBox - Shocker
IppSec
27 HackTheBox - Mantis
HackTheBox - Mantis
IppSec
28 HackTheBox - Node
HackTheBox - Node
IppSec
29 HackTheBox - Kotarak
HackTheBox - Kotarak
IppSec
30 HackTheBox - Enterprise
HackTheBox - Enterprise
IppSec
31 HackTheBox - Sense
HackTheBox - Sense
IppSec
32 HackTheBox - Minion
HackTheBox - Minion
IppSec
33 VulnHub - Sokar
VulnHub - Sokar
IppSec
34 VulnHub - Pinkys Palace v2
VulnHub - Pinkys Palace v2
IppSec
35 HackTheBox - Inception
HackTheBox - Inception
IppSec
36 Vulnhub - Trollcave 1.2
Vulnhub - Trollcave 1.2
IppSec
37 HackTheBox - Ariekei
HackTheBox - Ariekei
IppSec
38 HackTheBox - Flux Capacitor
HackTheBox - Flux Capacitor
IppSec
39 HackTheBox - Jeeves
HackTheBox - Jeeves
IppSec
40 HackTheBox - Tally
HackTheBox - Tally
IppSec
41 HackTheBox - CrimeStoppers
HackTheBox - CrimeStoppers
IppSec
42 HackTheBox - Fulcrum
HackTheBox - Fulcrum
IppSec
43 HackTheBox - Chatterbox
HackTheBox - Chatterbox
IppSec
44 HackTheBox - Falafel
HackTheBox - Falafel
IppSec
45 How To Create Empire Modules
How To Create Empire Modules
IppSec
46 HackTheBox - Nightmare
HackTheBox - Nightmare
IppSec
47 HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
48 HackTheBox - Bart
HackTheBox - Bart
IppSec
49 HackTheBox -  Aragog
HackTheBox - Aragog
IppSec
50 HackTheBox - Valentine
HackTheBox - Valentine
IppSec
51 HackTheBox - Silo
HackTheBox - Silo
IppSec
52 HackTheBox - Rabbit
HackTheBox - Rabbit
IppSec
53 HackTheBox - Celestial
HackTheBox - Celestial
IppSec
54 HackTheBox - Stratosphere
HackTheBox - Stratosphere
IppSec
55 HackTheBox - Poison
HackTheBox - Poison
IppSec
56 HackTheBox - Canape
HackTheBox - Canape
IppSec
57 HackTheBox - Olympus
HackTheBox - Olympus
IppSec
58 HackTheBox - Sunday
HackTheBox - Sunday
IppSec
59 HackTheBox - Fighter
HackTheBox - Fighter
IppSec
60 HackTheBox - Bounty
HackTheBox - Bounty
IppSec

Related AI Lessons

Synthesizing the Principles-Building Your Cohesive Security Blueprint
Learn to build a cohesive security blueprint by synthesizing key cybersecurity principles
Medium · Cybersecurity
Security Through Obscurity-A Clever Tactic, But a Terrible Strategy
Learn why Security Through Obscurity is a flawed strategy for protecting digital systems and what alternatives can be used instead
Medium · Cybersecurity
American Lending Center Data Breach Impacts 123,000 Individuals: What Financial Institutions Must…
American Lending Center's data breach affects 123,000 individuals, highlighting the need for financial institutions to prioritize cybersecurity
Medium · Cybersecurity
Secure by Design-Building Foundations, Not Fixing Flaws
Learn to prioritize security from the ground up to avoid costly fixes later, a crucial mindset for developers and cybersecurity professionals
Medium · Cybersecurity

Chapters (19)

Introduction
1:00 Start of nmap
3:15 Identifying all the technologies used in the box
10:45 Looking at OpenStack Keystone Authentication and discovering CVE-2021-38155
12:15 Pulling up API DOCS to see how to login to Keystone, then testing lockout
14:00 Taking the Burpsuite Request, sending it to FFUF and using a trick to try each
25:30 Attempting to access Swift as a vendor to bypass auth, using GoBuster and disc
35:10 Start of analyzing the Pokatmon App, examining DNS, setting up a MITM with Bur
40:15 Using Frida to disable TLS Certificate Pinning on Flutter
45:20 Discovering the App Signs every request, grabbing the certificate out of the a
49:20 Performing an SQL Injection, getting an email address then looking for vulnera
58:48 Discovering CVE-2021-43557 in APISIX, which gives us an idea to URLEncode Path
1:04:45 Logging into the docs, gaining access to the API and finding an LFI
1:09:45 Looking into CVE-2021-35368, which is a ModSecurity Bypass that allows us to a
1:18:10 Using NGINX's temporary files with our PHP LFI to gain code execution
1:27:55 Shell returned on Pokatdex-API, exporting Kubernetes secrets
1:34:20 Discovering an APISIX admin key and exploiting this service by creating a rout
1:59:20 Shell returned on the APISIX box, discovering credentials we can SSH with
2:11:10 Explioting the CRI-O with Kubernetes to set a kernel param to execute a script
Up next
Top 7 Free Cybersecurity Courses With Certificates | Learn Cybersecurity For Free | Simplilearn
Simplilearn
Watch →