HackTheBox - Player
01:45 - Begin of recon, wireshark nmap to see how it identified the hostname. The way this box is configured apache is placing the hostname when the "Host: " HTTP Header is not present.
06:00 - Starting a bunch of automated tools. Nmap all ports, and gobuster to discover VHOST (virtual hosts) and files.
09:55 - Checking dev.player.htb and identify the framework (Codiad) is being leaked in some javascript
12:25 - Checking chat.player.htb, nothing really here just hints at source code disclosure on other domains
14:05 - Checking staging.player.htb, sending an email leaks some interesting files
18:00 - Checking player.htb/launcher, entering an email leaks some other PHP Files along with a JWT Token
21:00 - Discovering backup files, showing BurpSutie Pro can do it but I had added this feature in GoBuster
21:50 - Going over exactly what I did in GoBuster to add the DiscoverBackup feature
27:35 - Using GoBuster with the new feature to discover some PHP Source that leaks the JWT Secret
32:20 - Using JWT.IO to create our forged JWT and discover a new page that proccesses Video Files
37:25 - Looking into FFMPEG Vulnerabilities to discover an LFI, using "Payload All The Things" to exploit this. Grab files Apache Config, Config files in web directories, /proc/net to see listening ports
50:00 - Trying the telegen credentials we retrieved from /var/www/backup/service_config with various services. See we can login to 6686 but are in a locked down shell
51:45 - Running searchsploit to see an XAUTH command injection that allows for reading/writing files. Failing to writefiles, but can now read .php files grab more source code to get another credential (Peter)
55:45 - Peter's creds work at dev.player.htb which allows for uploading files. Uploading a php reverse shell
1:00:40 - Reverse shell returned. Running su -s /bin/bash telegen to bypass the restricted shell
1:01:30 - Noticing the XAUTH command actually wrote a file! Going back to see why we failed to write to web directori
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
Chapters (16)
1:45
Begin of recon, wireshark nmap to see how it identified the hostname. The way
6:00
Starting a bunch of automated tools. Nmap all ports, and gobuster to discover
9:55
Checking dev.player.htb and identify the framework (Codiad) is being leaked in
12:25
Checking chat.player.htb, nothing really here just hints at source code disclo
14:05
Checking staging.player.htb, sending an email leaks some interesting files
18:00
Checking player.htb/launcher, entering an email leaks some other PHP Files alo
21:00
Discovering backup files, showing BurpSutie Pro can do it but I had added this
21:50
Going over exactly what I did in GoBuster to add the DiscoverBackup feature
27:35
Using GoBuster with the new feature to discover some PHP Source that leaks the
32:20
Using JWT.IO to create our forged JWT and discover a new page that proccesses
37:25
Looking into FFMPEG Vulnerabilities to discover an LFI, using "Payload All The
50:00
Trying the telegen credentials we retrieved from /var/www/backup/service_confi
51:45
Running searchsploit to see an XAUTH command injection that allows for reading
55:45
Peter's creds work at dev.player.htb which allows for uploading files. Upload
1:00:40
Reverse shell returned. Running su -s /bin/bash telegen to bypass the restric
1:01:30
Noticing the XAUTH command actually wrote a file! Going back to see why we fai
🎓
Tutor Explanation
DeepCamp AI