HackTheBox - Traverxec

IppSec · Beginner ·🔐 Cybersecurity ·6y ago
01:00 - Running nmap against the box, port 80 is running a unique webserver (nostromo) 03:00 - Lets check out the website before we throw any exploits 06:37 - Launching metasploit then exploting Nostromo but sending the exploit through burpsuite to see what it is doing 10:34 - Code Execution worked, for some reason the proxies command didn't work the first time 11:18 - Explaining why the script does a GET request before throughing an exploit (Exploit Verification) 13:40 - Editing the payload to send a Bash Reverse Shell 15:40 - Running LinPEAS 17:20 - Running LinEnum in Thorough mode 19:22 - Going over LinPEAS Output 22:16 - Going over LinEnum Output 23:00 - Discovering a HTPASSWD Password, then using hashcat to crack it 26:45 - Looking at the HTTP Configuration file to discover public_www directory in home directories 27:30 - Explaining Linux Permissions on Directories and why we can do a ls in /home/david/public_www but not /home/david/ 29:50 - Discovering an encrypting SSH Key for David in public_www, downloading the file via netcat then cracking the key with sshng2john.py John 34:50 - SSH into the box as David 35:20 - Discovering David can sudo journalctl, 37:10 - Demonstrating that the pipe operator doesn't run as an elevated user when doing sudo 38:00 - Privesc by removing the pipe and then running !bash. Explaining why this works by tracing parent processes to see journalctl is just executing pager which is symlink'd to less 40:50 - Comparing the Directory traversal exploits (MSF and non-MSF) to see a weird bug adding %0d bypassed the /../ whitelist check 49:30 - Downloading the source code to nostromo (patched and unpatched versions) and analyzing the patch to see why %0d worked. 50:27 - Using find and grep to md5sum all the files to figure out what has changed. 53:26 - Using diff to compare two files
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from IppSec · IppSec · 0 of 60

← Previous Next →
1 HHC2016 - Analytics
HHC2016 - Analytics
IppSec
2 HackTheBox - October
HackTheBox - October
IppSec
3 HackTheBox - Arctic
HackTheBox - Arctic
IppSec
4 HackTheBox - Brainfuck
HackTheBox - Brainfuck
IppSec
5 HackTheBox - Bank
HackTheBox - Bank
IppSec
6 HackTheBox - Joker
HackTheBox - Joker
IppSec
7 HackTheBox - Lazy
HackTheBox - Lazy
IppSec
8 Camp CTF 2015 - Bitterman
Camp CTF 2015 - Bitterman
IppSec
9 HackTheBox - Devel
HackTheBox - Devel
IppSec
10 Reversing Malicious Office Document (Macro) Emotet(?)
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
11 HackTheBox - Granny and Grandpa
HackTheBox - Granny and Grandpa
IppSec
12 HackTheBox - Pivoting Update: Granny and Grandpa
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
13 HackTheBox - Optimum
HackTheBox - Optimum
IppSec
14 HackTheBox - Charon
HackTheBox - Charon
IppSec
15 HackTheBox - Sneaky
HackTheBox - Sneaky
IppSec
16 HackTheBox - Holiday
HackTheBox - Holiday
IppSec
17 HackTheBox - Europa
HackTheBox - Europa
IppSec
18 Introduction to tmux
Introduction to tmux
IppSec
19 HackTheBox - Blocky
HackTheBox - Blocky
IppSec
20 HackTheBox - Nineveh
HackTheBox - Nineveh
IppSec
21 HackTheBox - Jail
HackTheBox - Jail
IppSec
22 HackTheBox - Blue
HackTheBox - Blue
IppSec
23 HackTheBox - Calamity
HackTheBox - Calamity
IppSec
24 HackTheBox - Shrek
HackTheBox - Shrek
IppSec
25 HackTheBox - Mirai
HackTheBox - Mirai
IppSec
26 HackTheBox - Shocker
HackTheBox - Shocker
IppSec
27 HackTheBox - Mantis
HackTheBox - Mantis
IppSec
28 HackTheBox - Node
HackTheBox - Node
IppSec
29 HackTheBox - Kotarak
HackTheBox - Kotarak
IppSec
30 HackTheBox - Enterprise
HackTheBox - Enterprise
IppSec
31 HackTheBox - Sense
HackTheBox - Sense
IppSec
32 HackTheBox - Minion
HackTheBox - Minion
IppSec
33 VulnHub - Sokar
VulnHub - Sokar
IppSec
34 VulnHub - Pinkys Palace v2
VulnHub - Pinkys Palace v2
IppSec
35 HackTheBox - Inception
HackTheBox - Inception
IppSec
36 Vulnhub - Trollcave 1.2
Vulnhub - Trollcave 1.2
IppSec
37 HackTheBox - Ariekei
HackTheBox - Ariekei
IppSec
38 HackTheBox - Flux Capacitor
HackTheBox - Flux Capacitor
IppSec
39 HackTheBox - Jeeves
HackTheBox - Jeeves
IppSec
40 HackTheBox - Tally
HackTheBox - Tally
IppSec
41 HackTheBox - CrimeStoppers
HackTheBox - CrimeStoppers
IppSec
42 HackTheBox - Fulcrum
HackTheBox - Fulcrum
IppSec
43 HackTheBox - Chatterbox
HackTheBox - Chatterbox
IppSec
44 HackTheBox - Falafel
HackTheBox - Falafel
IppSec
45 How To Create Empire Modules
How To Create Empire Modules
IppSec
46 HackTheBox - Nightmare
HackTheBox - Nightmare
IppSec
47 HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
48 HackTheBox - Bart
HackTheBox - Bart
IppSec
49 HackTheBox -  Aragog
HackTheBox - Aragog
IppSec
50 HackTheBox - Valentine
HackTheBox - Valentine
IppSec
51 HackTheBox - Silo
HackTheBox - Silo
IppSec
52 HackTheBox - Rabbit
HackTheBox - Rabbit
IppSec
53 HackTheBox - Celestial
HackTheBox - Celestial
IppSec
54 HackTheBox - Stratosphere
HackTheBox - Stratosphere
IppSec
55 HackTheBox - Poison
HackTheBox - Poison
IppSec
56 HackTheBox - Canape
HackTheBox - Canape
IppSec
57 HackTheBox - Olympus
HackTheBox - Olympus
IppSec
58 HackTheBox - Sunday
HackTheBox - Sunday
IppSec
59 HackTheBox - Fighter
HackTheBox - Fighter
IppSec
60 HackTheBox - Bounty
HackTheBox - Bounty
IppSec

Related AI Lessons

Linux Capture The Flag Bandit Level 14
Learn to use networking fundamentals and tools to solve a Linux Capture The Flag challenge
Medium · Cybersecurity
The Architecture of Trust
Learn how single checkpoints can fail in digital life and human relationships, and why Multi-Factor Authentication is crucial for building trust
Medium · Cybersecurity
The GRC Professional of the Future: Why Context Beats Frameworks
The future of GRC professionals in cybersecurity requires understanding context over memorizing frameworks, enabling more effective risk management
Medium · AI
The GRC Professional of the Future: Why Context Beats Frameworks
Learn why context is more important than frameworks in cybersecurity and how it impacts the future of GRC professionals
Medium · Cybersecurity

Chapters (22)

1:00 Running nmap against the box, port 80 is running a unique webserver (nostromo)
3:00 Lets check out the website before we throw any exploits
6:37 Launching metasploit then exploting Nostromo but sending the exploit through b
10:34 Code Execution worked, for some reason the proxies command didn't work the fir
11:18 Explaining why the script does a GET request before throughing an exploit (Exp
13:40 Editing the payload to send a Bash Reverse Shell
15:40 Running LinPEAS
17:20 Running LinEnum in Thorough mode
19:22 Going over LinPEAS Output
22:16 Going over LinEnum Output
23:00 Discovering a HTPASSWD Password, then using hashcat to crack it
26:45 Looking at the HTTP Configuration file to discover public_www directory in hom
27:30 Explaining Linux Permissions on Directories and why we can do a ls in /home/da
29:50 Discovering an encrypting SSH Key for David in public_www, downloading the fil
34:50 SSH into the box as David
35:20 Discovering David can sudo journalctl,
37:10 Demonstrating that the pipe operator doesn't run as an elevated user when doin
38:00 Privesc by removing the pipe and then running !bash. Explaining why this work
40:50 Comparing the Directory traversal exploits (MSF and non-MSF) to see a weird bu
49:30 Downloading the source code to nostromo (patched and unpatched versions) and a
50:27 Using find and grep to md5sum all the files to figure out what has changed.
53:26 Using diff to compare two files
Up next
How do I resolve the "Kernel panic - not syncing" error in my EC2 instance?
Amazon Web Services
Watch →