HackTheBox - Redcross

IppSec · Beginner ·🔐 Cybersecurity ·7y ago
00:20 - Flow chart of potential paths through this box 02:25 - Begin of recon, SSL Enumeration, examining PHP Behavior 06:23 - Using GoBuster to dicover directories, pdf's, and php scripts 08:10 - Using wfuzz to discover subdomains (virtual host routing) 12:15 - Guessing credential, logging in with guest:guest disover SQL Injection 16:45 - Manually doing an error-based SQL Injection with extractquery() ** Go watch the Enterprise Video if you want Double Query Based Errors ** 31:50 - A good screenshot showing the SQL Inject Queries used, then cracking 35:00 - Doing the SQLInjection with SQLMap, needed the delay flag! ** Going back to start of box 37:50 - Examining the account-signup.pdf to create a user 39:50 - Doing XSS (cross site scripting) to steal a cookie of the admin 43:15 - Going to admin.redcross.htb and showing that any way you got the PHPSESSID cookie would work 46:15 - Poking at admin.redcross.htb, creating a user that lands us in an SSH Jail 48:38 - Playing with the Firewall portion of the site, discover command injection in deleting rules! 52:28 - Reverse shell as www-data 54:40 - Discover postgresql credentials in actions.php, this database lets you create users! 1:00:21 - Inserting a user into the database, then logging in with SSH 1:02:40 - Examining /etc to discover a different postgresql account-signup 1:04:50 - Adding a root user with the new credentials, then sudo to root! *** Going back to just adding our IP to the whitelist in firewall 1:06:29 - Discovering Haraka running 1:09:10 - Using Metasploit to exploit haraka, get shell as penelope 1:12:26 - Doing the PG thing again but this time specify sudo group, so we don't need to use the other PG account. *** Going back, lets do the overflow! No postgres at all * Go watch Bitterman if this is confusing 1:15:50 - Examining iptctl.c 1:19:56 - Using Pattern_Create to discover where the RSP (RIP) Overwrite occours. 1:21:15 - Start of python script 1:24:11 - Dumping PLT Functions to use with our rop ch
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from IppSec · IppSec · 0 of 60

← Previous Next →
1 HHC2016 - Analytics
HHC2016 - Analytics
IppSec
2 HackTheBox - October
HackTheBox - October
IppSec
3 HackTheBox - Arctic
HackTheBox - Arctic
IppSec
4 HackTheBox - Brainfuck
HackTheBox - Brainfuck
IppSec
5 HackTheBox - Bank
HackTheBox - Bank
IppSec
6 HackTheBox - Joker
HackTheBox - Joker
IppSec
7 HackTheBox - Lazy
HackTheBox - Lazy
IppSec
8 Camp CTF 2015 - Bitterman
Camp CTF 2015 - Bitterman
IppSec
9 HackTheBox - Devel
HackTheBox - Devel
IppSec
10 Reversing Malicious Office Document (Macro) Emotet(?)
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
11 HackTheBox - Granny and Grandpa
HackTheBox - Granny and Grandpa
IppSec
12 HackTheBox - Pivoting Update: Granny and Grandpa
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
13 HackTheBox - Optimum
HackTheBox - Optimum
IppSec
14 HackTheBox - Charon
HackTheBox - Charon
IppSec
15 HackTheBox - Sneaky
HackTheBox - Sneaky
IppSec
16 HackTheBox - Holiday
HackTheBox - Holiday
IppSec
17 HackTheBox - Europa
HackTheBox - Europa
IppSec
18 Introduction to tmux
Introduction to tmux
IppSec
19 HackTheBox - Blocky
HackTheBox - Blocky
IppSec
20 HackTheBox - Nineveh
HackTheBox - Nineveh
IppSec
21 HackTheBox - Jail
HackTheBox - Jail
IppSec
22 HackTheBox - Blue
HackTheBox - Blue
IppSec
23 HackTheBox - Calamity
HackTheBox - Calamity
IppSec
24 HackTheBox - Shrek
HackTheBox - Shrek
IppSec
25 HackTheBox - Mirai
HackTheBox - Mirai
IppSec
26 HackTheBox - Shocker
HackTheBox - Shocker
IppSec
27 HackTheBox - Mantis
HackTheBox - Mantis
IppSec
28 HackTheBox - Node
HackTheBox - Node
IppSec
29 HackTheBox - Kotarak
HackTheBox - Kotarak
IppSec
30 HackTheBox - Enterprise
HackTheBox - Enterprise
IppSec
31 HackTheBox - Sense
HackTheBox - Sense
IppSec
32 HackTheBox - Minion
HackTheBox - Minion
IppSec
33 VulnHub - Sokar
VulnHub - Sokar
IppSec
34 VulnHub - Pinkys Palace v2
VulnHub - Pinkys Palace v2
IppSec
35 HackTheBox - Inception
HackTheBox - Inception
IppSec
36 Vulnhub - Trollcave 1.2
Vulnhub - Trollcave 1.2
IppSec
37 HackTheBox - Ariekei
HackTheBox - Ariekei
IppSec
38 HackTheBox - Flux Capacitor
HackTheBox - Flux Capacitor
IppSec
39 HackTheBox - Jeeves
HackTheBox - Jeeves
IppSec
40 HackTheBox - Tally
HackTheBox - Tally
IppSec
41 HackTheBox - CrimeStoppers
HackTheBox - CrimeStoppers
IppSec
42 HackTheBox - Fulcrum
HackTheBox - Fulcrum
IppSec
43 HackTheBox - Chatterbox
HackTheBox - Chatterbox
IppSec
44 HackTheBox - Falafel
HackTheBox - Falafel
IppSec
45 How To Create Empire Modules
How To Create Empire Modules
IppSec
46 HackTheBox - Nightmare
HackTheBox - Nightmare
IppSec
47 HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
48 HackTheBox - Bart
HackTheBox - Bart
IppSec
49 HackTheBox -  Aragog
HackTheBox - Aragog
IppSec
50 HackTheBox - Valentine
HackTheBox - Valentine
IppSec
51 HackTheBox - Silo
HackTheBox - Silo
IppSec
52 HackTheBox - Rabbit
HackTheBox - Rabbit
IppSec
53 HackTheBox - Celestial
HackTheBox - Celestial
IppSec
54 HackTheBox - Stratosphere
HackTheBox - Stratosphere
IppSec
55 HackTheBox - Poison
HackTheBox - Poison
IppSec
56 HackTheBox - Canape
HackTheBox - Canape
IppSec
57 HackTheBox - Olympus
HackTheBox - Olympus
IppSec
58 HackTheBox - Sunday
HackTheBox - Sunday
IppSec
59 HackTheBox - Fighter
HackTheBox - Fighter
IppSec
60 HackTheBox - Bounty
HackTheBox - Bounty
IppSec

Related AI Lessons

Linux Capture The Flag Bandit Level 14
Learn to use networking fundamentals and tools to solve a Linux Capture The Flag challenge
Medium · Cybersecurity
The Architecture of Trust
Learn how single checkpoints can fail in digital life and human relationships, and why Multi-Factor Authentication is crucial for building trust
Medium · Cybersecurity
The GRC Professional of the Future: Why Context Beats Frameworks
The future of GRC professionals in cybersecurity requires understanding context over memorizing frameworks, enabling more effective risk management
Medium · AI
The GRC Professional of the Future: Why Context Beats Frameworks
Learn why context is more important than frameworks in cybersecurity and how it impacts the future of GRC professionals
Medium · Cybersecurity

Chapters (25)

0:20 Flow chart of potential paths through this box
2:25 Begin of recon, SSL Enumeration, examining PHP Behavior
6:23 Using GoBuster to dicover directories, pdf's, and php scripts
8:10 Using wfuzz to discover subdomains (virtual host routing)
12:15 Guessing credential, logging in with guest:guest disover SQL Injection
16:45 Manually doing an error-based SQL Injection with extractquery()
31:50 A good screenshot showing the SQL Inject Queries used, then cracking
35:00 Doing the SQLInjection with SQLMap, needed the delay flag!
37:50 Examining the account-signup.pdf to create a user
39:50 Doing XSS (cross site scripting) to steal a cookie of the admin
43:15 Going to admin.redcross.htb and showing that any way you got the PHPSESSID coo
46:15 Poking at admin.redcross.htb, creating a user that lands us in an SSH Jail
48:38 Playing with the Firewall portion of the site, discover command injection in d
52:28 Reverse shell as www-data
54:40 Discover postgresql credentials in actions.php, this database lets you create
1:00:21 Inserting a user into the database, then logging in with SSH
1:02:40 Examining /etc to discover a different postgresql account-signup
1:04:50 Adding a root user with the new credentials, then sudo to root!
1:06:29 Discovering Haraka running
1:09:10 Using Metasploit to exploit haraka, get shell as penelope
1:12:26 Doing the PG thing again but this time specify sudo group, so we don't need to
1:15:50 Examining iptctl.c
1:19:56 Using Pattern_Create to discover where the RSP (RIP) Overwrite occours.
1:21:15 Start of python script
1:24:11 Dumping PLT Functions to use with our rop ch
Up next
How do I resolve the "Kernel panic - not syncing" error in my EC2 instance?
Amazon Web Services
Watch →