HackTheBox - Sekhmet
00:00 - Intro
01:11 - Start of nmap
04:00 - Running ffuf to discover the portal virtual host
06:40 - Logging in with admin:admin and discovering a new cookie
09:15 - Looking at the Node-Serialize exploit
10:20 - Attempting to do the exploit and discovering modsecurity blocks us, then putting some unicode in the payload to evade it
16:20 - Whoops forgot to end the payload with (), so thats why we didn't get our shell
17:11 - EDIT Looking at how modsecurity is configured
19:33 - Showing the NGINX Error Log with modsecurity blocking, taking the unique ID going to the modsecurity log to get more information
25:00 - Looking at the JSDECODE transform for modsecurity to fix the rule
30:30 - Switching ModSecurity to Detection Only mode or Permissive so we don't block but get logs
31:42 - END OF EDIT, putting an SSH Key on the box
34:15 - Attempting to unzip the backup.zip, discovering a password but is using ZipCrypto, doing a plaintext crac with bkcrack to extract it
40:00 - Dumping the sssd.ldb database used to join the linux server to the domain. Getting a credential
44:20 - Using kinit to get a kerberos ticket, then ksu to switch to root
47:00 - Having trouble with tunneling, looking at iptables to see it blocks non-root users from accessing 192.168.0.0
52:30 - Looking at the shares to discover a powershell program to reset mobile phone numbers
1:02:30 - Modifying a phone number via ldap and seeing a script will execute what we put in the field
1:11:40 - Attempting to steal a NTLMv2 Hash, having trouble because NTLM is disabled
1:14:15 - Forwarding port 445 from the webserver to us, so we can use its DNS Name, but need to enable GatewayPorts in SSHD's config to listen on a non-loopback port
1:20:05 - Building a list of users with ldapsearch, then password spraying the password we cracked to get access to bob.wood
1:27:00 - Downloading dpapi keys and chrome/edge files then using pypykatz to decrypt saved passwords
1:36:11 - Got all the files on our box, using pypykatz to
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Phalanx - A Local Cyber Shield Tool for Open-Source Packages
Medium · Cybersecurity
How to keep bug bounty findings alive in the queue: the HEAD verification matrix
Dev.to · Jaeyoung Yun
A Practical Terraform Security Review with Codex and Claude Code
Dev.to · Mike Anderson
NordVPN vs ExpressVPN in 2026: Which is Honestly Better?
Medium · Cybersecurity
Chapters (23)
Intro
1:11
Start of nmap
4:00
Running ffuf to discover the portal virtual host
6:40
Logging in with admin:admin and discovering a new cookie
9:15
Looking at the Node-Serialize exploit
10:20
Attempting to do the exploit and discovering modsecurity blocks us, then putti
16:20
Whoops forgot to end the payload with (), so thats why we didn't get our shell
17:11
EDIT Looking at how modsecurity is configured
19:33
Showing the NGINX Error Log with modsecurity blocking, taking the unique ID go
25:00
Looking at the JSDECODE transform for modsecurity to fix the rule
30:30
Switching ModSecurity to Detection Only mode or Permissive so we don't block b
31:42
END OF EDIT, putting an SSH Key on the box
34:15
Attempting to unzip the backup.zip, discovering a password but is using ZipCry
40:00
Dumping the sssd.ldb database used to join the linux server to the domain. Get
44:20
Using kinit to get a kerberos ticket, then ksu to switch to root
47:00
Having trouble with tunneling, looking at iptables to see it blocks non-root u
52:30
Looking at the shares to discover a powershell program to reset mobile phone n
1:02:30
Modifying a phone number via ldap and seeing a script will execute what we put
1:11:40
Attempting to steal a NTLMv2 Hash, having trouble because NTLM is disabled
1:14:15
Forwarding port 445 from the webserver to us, so we can use its DNS Name, but
1:20:05
Building a list of users with ldapsearch, then password spraying the password
1:27:00
Downloading dpapi keys and chrome/edge files then using pypykatz to decrypt sa
1:36:11
Got all the files on our box, using pypykatz to
🎓
Tutor Explanation
DeepCamp AI