HackTheBox - Scavenger
Skills:
Network Security90%
01:30 - Begin of Recon
05:50 - Discovering an SQL Injection inside of the WhoIs Service
07:20 - Identifying we can perform DNS Zone Transfers with dig axfr (aquatone is the application i mention to take screenshots)
12:10 - Explaining the SQL Union Injection
16:30 - Dumping information out of Information_Schema via the SQL Union Injection
23:05 - Dumping hostnames out of the whois database via the SQL Union Injection
28:45 - Discovering the pwned website, discovering shell.php with GoBuster
31:45 - Using wget to get the date the webserver was defaced
33:00 - Using wfuzz to find the parameter (hidden) the attackers shell used, then we have code execution on the machine.
39:15 - Using find with newermt to identify what happened around the time the attacker pwned the box
46:00 - Discovering mail file that has some credentials for an FTP User
49:17 - Using grep/awk to find the hacker in an apache access logs
51:44 - Searching wireshark to pull the attackers post request to pull more credentials and the files the attacker uploaded to the server.
55:05 - Analyzing root.c kernel module
56:00 - Testing the kernel rootkit didn't work over HTTP, lets get a forward shell and try it there.
01:02:22 - Testing passwords to gain access to ib01c01, which has the compiled kernel root kit (root.ko)
01:05:20 - Analyzing root.ko in Ghidra to discover some slight changes to the root.c source code.
01:09:20 - Sending g3tPr1v to /dev/ttyR0 to activate the rootkit and switch to root
01:10:02 - Testing nc with a source port of 20 to verify our assumption only root can do this is true
01:11:50 - Creating a PHP Script to act as middleware between SQLMap and the WhoIs port and allow us to use SQLMap to dump the database
01:22:20 - Manually installing Zeek (formerly known as Bro) to analyze the pcap.
01:25:50 - Zeek has been installed, running it against the pcap with Cr to ignore checksum errors
01:26:42 - Showing how to manually analyze zeek logs with less -S and zeek-cut
01:31:50 - Instal
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
I Managed WordPress Security Across 1500+ Clients. The Main Reason WP Sites Get Hacked.
Dev.to AI
What Is YubiKey Authentication & How It Works
Dev.to · Mrunank Pawar
I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Medium · Data Science
I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Medium · Programming
Chapters (24)
1:30
Begin of Recon
5:50
Discovering an SQL Injection inside of the WhoIs Service
7:20
Identifying we can perform DNS Zone Transfers with dig axfr (aquatone is the a
12:10
Explaining the SQL Union Injection
16:30
Dumping information out of Information_Schema via the SQL Union Injection
23:05
Dumping hostnames out of the whois database via the SQL Union Injection
28:45
Discovering the pwned website, discovering shell.php with GoBuster
31:45
Using wget to get the date the webserver was defaced
33:00
Using wfuzz to find the parameter (hidden) the attackers shell used, then we h
39:15
Using find with newermt to identify what happened around the time the attacker
46:00
Discovering mail file that has some credentials for an FTP User
49:17
Using grep/awk to find the hacker in an apache access logs
51:44
Searching wireshark to pull the attackers post request to pull more credential
55:05
Analyzing root.c kernel module
56:00
Testing the kernel rootkit didn't work over HTTP, lets get a forward shell and
1:02:22
Testing passwords to gain access to ib01c01, which has the compiled kernel roo
1:05:20
Analyzing root.ko in Ghidra to discover some slight changes to the root.c sour
1:09:20
Sending g3tPr1v to /dev/ttyR0 to activate the rootkit and switch to root
1:10:02
Testing nc with a source port of 20 to verify our assumption only root can do
1:11:50
Creating a PHP Script to act as middleware between SQLMap and the WhoIs port
1:22:20
Manually installing Zeek (formerly known as Bro) to analyze the pcap.
1:25:50
Zeek has been installed, running it against the pcap with Cr to ignore checksu
1:26:42
Showing how to manually analyze zeek logs with less -S and zeek-cut
1:31:50
Instal
🎓
Tutor Explanation
DeepCamp AI