HackTheBox - Writer
00:00 - Into
00:49 - Start of nmap
06:10 - Discovering admin login page, running SQLMap and discovering it is SQL Injectable
07:45 - Testing for SQL Injections in the username and password, discovering injection in the username
10:15 - The adminsitrative interface lets us upload images, failing to upload a PHP Shell
14:30 - Using the SQL Union Injection to extract source code via Load_file, then creating a python script to automate it
17:35 - Creating a Regular Expression in Python to grab only the data we want and be multiline
22:45 - Downloading a good LFI Wordlist and then using it with our python script to find interesting files
26:30 - Finding the apache configuration which gives us where the web application lives
27:10 - Updating our LOAD_FILE command to utilize TO_BASE64 in order to get around the web application doing HTML Entity Encoding
33:30 - Discoving an hardcoded password in the python flask web application
35:05 - Discovering command injection in how the web application handles URL's
37:20 - Simplifying our reverse shell by using a base64 cradle
40:04 - Having troubles uploading the image, create the image manually on our box, so the image upload form creates the request for us. Then getting a shell
45:10 - Discovering another database password within the second web application, cracking a password then switching to the Kyle user
51:00 - Using find to find files owned by a group
51:45 - Examaning the Postfix config to see it executes the Disclaimer script as John and is editable by our gorup. Edit the file, then sent an email to get shell as John.
55:00 - Showing John doesn't get all the groups assigned to him from the Postfix shell. SSH allows this group to be assigned to him
57:24 - Write access to apt.conf.d, creating a pre-invoke script which is a persistence technique to run code whenever apt is ran
1:01:04 - Showing the intended route of this box by editing a python script over SMB
1:04:30 - Using the Image Upload form as a SSRF in order to ac
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Why Businesses Quietly Accept Technology Friction as “Normal”
Medium · Cybersecurity
The Model You Just Downloaded Might Own Your Network — What I Learned Building Defenses Against AI…
Medium · Cybersecurity
I Found Backdoored AI Models on Hugging Face — And So Has Everyone Else Who Bothered to Look
Medium · Cybersecurity
The XSS Escalation Playbook: From Basic Reflection to DOM Breakouts
Medium · Cybersecurity
Chapters (21)
Into
0:49
Start of nmap
6:10
Discovering admin login page, running SQLMap and discovering it is SQL Injecta
7:45
Testing for SQL Injections in the username and password, discovering injection
10:15
The adminsitrative interface lets us upload images, failing to upload a PHP Sh
14:30
Using the SQL Union Injection to extract source code via Load_file, then creat
17:35
Creating a Regular Expression in Python to grab only the data we want and be m
22:45
Downloading a good LFI Wordlist and then using it with our python script to fi
26:30
Finding the apache configuration which gives us where the web application live
27:10
Updating our LOAD_FILE command to utilize TO_BASE64 in order to get around the
33:30
Discoving an hardcoded password in the python flask web application
35:05
Discovering command injection in how the web application handles URL's
37:20
Simplifying our reverse shell by using a base64 cradle
40:04
Having troubles uploading the image, create the image manually on our box, so
45:10
Discovering another database password within the second web application, crack
51:00
Using find to find files owned by a group
51:45
Examaning the Postfix config to see it executes the Disclaimer script as John
55:00
Showing John doesn't get all the groups assigned to him from the Postfix shell
57:24
Write access to apt.conf.d, creating a pre-invoke script which is a persistenc
1:01:04
Showing the intended route of this box by editing a python script over SMB
1:04:30
Using the Image Upload form as a SSRF in order to ac
🎓
Tutor Explanation
DeepCamp AI