HackTheBox - Player

IppSec · Beginner ·🔐 Cybersecurity ·6y ago
01:45 - Begin of recon, wireshark nmap to see how it identified the hostname. The way this box is configured apache is placing the hostname when the "Host: " HTTP Header is not present. 06:00 - Starting a bunch of automated tools. Nmap all ports, and gobuster to discover VHOST (virtual hosts) and files. 09:55 - Checking dev.player.htb and identify the framework (Codiad) is being leaked in some javascript 12:25 - Checking chat.player.htb, nothing really here just hints at source code disclosure on other domains 14:05 - Checking staging.player.htb, sending an email leaks some interesting files 18:00 - Checking player.htb/launcher, entering an email leaks some other PHP Files along with a JWT Token 21:00 - Discovering backup files, showing BurpSutie Pro can do it but I had added this feature in GoBuster 21:50 - Going over exactly what I did in GoBuster to add the DiscoverBackup feature 27:35 - Using GoBuster with the new feature to discover some PHP Source that leaks the JWT Secret 32:20 - Using JWT.IO to create our forged JWT and discover a new page that proccesses Video Files 37:25 - Looking into FFMPEG Vulnerabilities to discover an LFI, using "Payload All The Things" to exploit this. Grab files Apache Config, Config files in web directories, /proc/net to see listening ports 50:00 - Trying the telegen credentials we retrieved from /var/www/backup/service_config with various services. See we can login to 6686 but are in a locked down shell 51:45 - Running searchsploit to see an XAUTH command injection that allows for reading/writing files. Failing to writefiles, but can now read .php files grab more source code to get another credential (Peter) 55:45 - Peter's creds work at dev.player.htb which allows for uploading files. Uploading a php reverse shell 1:00:40 - Reverse shell returned. Running su -s /bin/bash telegen to bypass the restricted shell 1:01:30 - Noticing the XAUTH command actually wrote a file! Going back to see why we failed to write to web directori
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from IppSec · IppSec · 0 of 60

← Previous Next →
1 HHC2016 - Analytics
HHC2016 - Analytics
IppSec
2 HackTheBox - October
HackTheBox - October
IppSec
3 HackTheBox - Arctic
HackTheBox - Arctic
IppSec
4 HackTheBox - Brainfuck
HackTheBox - Brainfuck
IppSec
5 HackTheBox - Bank
HackTheBox - Bank
IppSec
6 HackTheBox - Joker
HackTheBox - Joker
IppSec
7 HackTheBox - Lazy
HackTheBox - Lazy
IppSec
8 Camp CTF 2015 - Bitterman
Camp CTF 2015 - Bitterman
IppSec
9 HackTheBox - Devel
HackTheBox - Devel
IppSec
10 Reversing Malicious Office Document (Macro) Emotet(?)
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
11 HackTheBox - Granny and Grandpa
HackTheBox - Granny and Grandpa
IppSec
12 HackTheBox - Pivoting Update: Granny and Grandpa
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
13 HackTheBox - Optimum
HackTheBox - Optimum
IppSec
14 HackTheBox - Charon
HackTheBox - Charon
IppSec
15 HackTheBox - Sneaky
HackTheBox - Sneaky
IppSec
16 HackTheBox - Holiday
HackTheBox - Holiday
IppSec
17 HackTheBox - Europa
HackTheBox - Europa
IppSec
18 Introduction to tmux
Introduction to tmux
IppSec
19 HackTheBox - Blocky
HackTheBox - Blocky
IppSec
20 HackTheBox - Nineveh
HackTheBox - Nineveh
IppSec
21 HackTheBox - Jail
HackTheBox - Jail
IppSec
22 HackTheBox - Blue
HackTheBox - Blue
IppSec
23 HackTheBox - Calamity
HackTheBox - Calamity
IppSec
24 HackTheBox - Shrek
HackTheBox - Shrek
IppSec
25 HackTheBox - Mirai
HackTheBox - Mirai
IppSec
26 HackTheBox - Shocker
HackTheBox - Shocker
IppSec
27 HackTheBox - Mantis
HackTheBox - Mantis
IppSec
28 HackTheBox - Node
HackTheBox - Node
IppSec
29 HackTheBox - Kotarak
HackTheBox - Kotarak
IppSec
30 HackTheBox - Enterprise
HackTheBox - Enterprise
IppSec
31 HackTheBox - Sense
HackTheBox - Sense
IppSec
32 HackTheBox - Minion
HackTheBox - Minion
IppSec
33 VulnHub - Sokar
VulnHub - Sokar
IppSec
34 VulnHub - Pinkys Palace v2
VulnHub - Pinkys Palace v2
IppSec
35 HackTheBox - Inception
HackTheBox - Inception
IppSec
36 Vulnhub - Trollcave 1.2
Vulnhub - Trollcave 1.2
IppSec
37 HackTheBox - Ariekei
HackTheBox - Ariekei
IppSec
38 HackTheBox - Flux Capacitor
HackTheBox - Flux Capacitor
IppSec
39 HackTheBox - Jeeves
HackTheBox - Jeeves
IppSec
40 HackTheBox - Tally
HackTheBox - Tally
IppSec
41 HackTheBox - CrimeStoppers
HackTheBox - CrimeStoppers
IppSec
42 HackTheBox - Fulcrum
HackTheBox - Fulcrum
IppSec
43 HackTheBox - Chatterbox
HackTheBox - Chatterbox
IppSec
44 HackTheBox - Falafel
HackTheBox - Falafel
IppSec
45 How To Create Empire Modules
How To Create Empire Modules
IppSec
46 HackTheBox - Nightmare
HackTheBox - Nightmare
IppSec
47 HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
48 HackTheBox - Bart
HackTheBox - Bart
IppSec
49 HackTheBox -  Aragog
HackTheBox - Aragog
IppSec
50 HackTheBox - Valentine
HackTheBox - Valentine
IppSec
51 HackTheBox - Silo
HackTheBox - Silo
IppSec
52 HackTheBox - Rabbit
HackTheBox - Rabbit
IppSec
53 HackTheBox - Celestial
HackTheBox - Celestial
IppSec
54 HackTheBox - Stratosphere
HackTheBox - Stratosphere
IppSec
55 HackTheBox - Poison
HackTheBox - Poison
IppSec
56 HackTheBox - Canape
HackTheBox - Canape
IppSec
57 HackTheBox - Olympus
HackTheBox - Olympus
IppSec
58 HackTheBox - Sunday
HackTheBox - Sunday
IppSec
59 HackTheBox - Fighter
HackTheBox - Fighter
IppSec
60 HackTheBox - Bounty
HackTheBox - Bounty
IppSec

Related AI Lessons

Linux Capture The Flag Bandit Level 14
Learn to use networking fundamentals and tools to solve a Linux Capture The Flag challenge
Medium · Cybersecurity
The Architecture of Trust
Learn how single checkpoints can fail in digital life and human relationships, and why Multi-Factor Authentication is crucial for building trust
Medium · Cybersecurity
The GRC Professional of the Future: Why Context Beats Frameworks
The future of GRC professionals in cybersecurity requires understanding context over memorizing frameworks, enabling more effective risk management
Medium · AI
The GRC Professional of the Future: Why Context Beats Frameworks
Learn why context is more important than frameworks in cybersecurity and how it impacts the future of GRC professionals
Medium · Cybersecurity

Chapters (16)

1:45 Begin of recon, wireshark nmap to see how it identified the hostname. The way
6:00 Starting a bunch of automated tools. Nmap all ports, and gobuster to discover
9:55 Checking dev.player.htb and identify the framework (Codiad) is being leaked in
12:25 Checking chat.player.htb, nothing really here just hints at source code disclo
14:05 Checking staging.player.htb, sending an email leaks some interesting files
18:00 Checking player.htb/launcher, entering an email leaks some other PHP Files alo
21:00 Discovering backup files, showing BurpSutie Pro can do it but I had added this
21:50 Going over exactly what I did in GoBuster to add the DiscoverBackup feature
27:35 Using GoBuster with the new feature to discover some PHP Source that leaks the
32:20 Using JWT.IO to create our forged JWT and discover a new page that proccesses
37:25 Looking into FFMPEG Vulnerabilities to discover an LFI, using "Payload All The
50:00 Trying the telegen credentials we retrieved from /var/www/backup/service_confi
51:45 Running searchsploit to see an XAUTH command injection that allows for reading
55:45 Peter's creds work at dev.player.htb which allows for uploading files. Upload
1:00:40 Reverse shell returned. Running su -s /bin/bash telegen to bypass the restric
1:01:30 Noticing the XAUTH command actually wrote a file! Going back to see why we fai
Up next
How do I resolve the "Kernel panic - not syncing" error in my EC2 instance?
Amazon Web Services
Watch →