HackTheBox - Sorcery

IppSec · Beginner ·🔐 Cybersecurity ·18h ago
00:00 - Introduciton 00:40 - Start of nmap 05:00 - Logging into the website, discovering some type of injection. Sending it to Claude in the background, while we look at it. 09:40 - Playing with a Neo4j/Cypher injection, found the query in the source code 20:30 - When we register as a seller, we can create products there is XSS here 27:20 - Using CSRF to have the user send us the page they are on, which is how we know the username 33:40 - Using Chrome to enroll in passkey (WebAuthn) login via a virtual passkey, looking at the HTTP Requests in BurpSuite 39:50 - Modifying our CSRF Script to start the enrollment of a PassKey and then send the challenge to our box, which lets us forge a response 46:25 - Start of creating our Flask App that uses the Soft-WebAuthN library to act as a virtual passkey, this lets us complete the challenge/response of passkeys 1:23:02 - Finally got the passkey registered via JS, now we need actually authenticate via the passkey so we can grab the cookie 1:39:00 - Showing the unintended that lets us skip the XSS and PassKey Step. Using a Cypher Query to save update the admin password then logging in as them 1:48:00 - Admin has the ability to send TCP Packets and specify data, showing this by making a request to a webserver 1:53:50 - Looking at the Rust Code, seeing it executes anything sent to the update topic of Kafka. Using Claude to build us the TCP Packet we can send to kafka and trigger RCE 2:02:30 - Uploading Chisel so we can easily pivot around, then downloading a certificate off the FTP Server 2:09:40 - Using pem2john to try and crack the RSA Certificate, finding out i needed to update pem2john to get it to work. 2:22:30 - Using OpenSSL so sign a key with the CA, 2:24:30 - Using MITMDump to forward all requests to gitea, and dump the traffic so we can phish the user, then update the DNS Container to include our hostname and swaks to email the user 2:33:00 - Got tom_summers credentials which gets us SSH Access, finding a xvfb dump, conv
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

CROSS-SITE SCRIPTING A HACKERS GUIDE
Learn about Cross-Site Scripting (XSS) and its implications on web security
Medium · Cybersecurity
Mahalleden Dünyaya: Bir Veri Paketinin LAN’dan WAN’a Büyük Göçü (Bölüm 6)
Learn about the journey of a data packet from LAN to WAN, understanding cybersecurity aspects
Medium · Cybersecurity
Dark Web Myths vs. Reality: A Computer Science Student’s Breakdown
Learn the difference between dark web myths and reality from a computer science student's perspective, understanding how it works and separating fiction from fact
Medium · Cybersecurity
# How MemoraEU Cannot Read Your Memories — Even If We Wanted To
Learn how zero-knowledge architecture ensures user memory privacy in MemoraEU, and why it's impossible for the system to read your memories
Dev.to · Philippe Quattrociocchi

Chapters (18)

Introduciton
0:40 Start of nmap
5:00 Logging into the website, discovering some type of injection. Sending it to Cl
9:40 Playing with a Neo4j/Cypher injection, found the query in the source code
20:30 When we register as a seller, we can create products there is XSS here
27:20 Using CSRF to have the user send us the page they are on, which is how we know
33:40 Using Chrome to enroll in passkey (WebAuthn) login via a virtual passkey, look
39:50 Modifying our CSRF Script to start the enrollment of a PassKey and then send t
46:25 Start of creating our Flask App that uses the Soft-WebAuthN library to act as
1:23:02 Finally got the passkey registered via JS, now we need actually authenticate v
1:39:00 Showing the unintended that lets us skip the XSS and PassKey Step. Using a Cyp
1:48:00 Admin has the ability to send TCP Packets and specify data, showing this by ma
1:53:50 Looking at the Rust Code, seeing it executes anything sent to the update topic
2:02:30 Uploading Chisel so we can easily pivot around, then downloading a certificate
2:09:40 Using pem2john to try and crack the RSA Certificate, finding out i needed to u
2:22:30 Using OpenSSL so sign a key with the CA,
2:24:30 Using MITMDump to forward all requests to gitea, and dump the traffic so we ca
2:33:00 Got tom_summers credentials which gets us SSH Access, finding a xvfb dump, con
Up next
CISA – Certified Information Systems Auditor Study Guide
Coursera
Watch →