HackTheBox - Postman
01:00 - Begin of nnmap scan
01:45 - Checking out the website, trying to identify what technology runs the site
03:20 - Nmap scan finished, start more recon (GoBuster and full nmap port scan)
07:00 - Trying to find out when the website was stood up with exiftool
09:00 - Full nmap showed the REDIS port, initial poking
10:55 - Searching the internet for things you can do with a REDIS Server
14:50 - Dropping a webshell didn't work, lets try dropping an SSH Key
16:30 - Discovering the location of a .ssh directory by guessing the default (/var/lib/redis/.ssh)
19:30 - Got a shell on the box!
22:00 - Running LinPEAS
29:45 - Running LinEnum twice (once with throrough mode enabled). To make sure we have good recon.
33:10 - Discovering Matt logged in at a time we did not previously have
36:07 - Discovering an encrypted SSH key, cracking the SSH Key with John
40:00 - SSH failing to work, decide to just use "su" to switch to the Matt User
42:00 - Discovering we can login to WebMin with Matt
42:48 - Running searchsploit, then using Metasploit to exploit Webmin
45:30 - Root shell returned, set Metasploit to go through burp and play with it until we get the exploit working.
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
LetsDefend — Investigate Web Attack
Medium · Cybersecurity
Breaking OAuth Trust: An Analysis of CVE-2026–45430 in Backdrop CMS
Medium · Cybersecurity
Discord now encrypts every voice and video call by default, and not even it can listen in
The Next Web AI
Mythic C2 Server ile AS-REP Roasting Attack ve Splunk ile Detection
Medium · Cybersecurity
Chapters (17)
1:00
Begin of nnmap scan
1:45
Checking out the website, trying to identify what technology runs the site
3:20
Nmap scan finished, start more recon (GoBuster and full nmap port scan)
7:00
Trying to find out when the website was stood up with exiftool
9:00
Full nmap showed the REDIS port, initial poking
10:55
Searching the internet for things you can do with a REDIS Server
14:50
Dropping a webshell didn't work, lets try dropping an SSH Key
16:30
Discovering the location of a .ssh directory by guessing the default (/var/lib
19:30
Got a shell on the box!
22:00
Running LinPEAS
29:45
Running LinEnum twice (once with throrough mode enabled). To make sure we hav
33:10
Discovering Matt logged in at a time we did not previously have
36:07
Discovering an encrypted SSH key, cracking the SSH Key with John
40:00
SSH failing to work, decide to just use "su" to switch to the Matt User
42:00
Discovering we can login to WebMin with Matt
42:48
Running searchsploit, then using Metasploit to exploit Webmin
45:30
Root shell returned, set Metasploit to go through burp and play with it until
🎓
Tutor Explanation
DeepCamp AI