UHC - BackendTwo
00:00 - Intro
00:49 - Start of nmap
02:17 - Talking about why dirbusting an API is different. Bruteforce methods instead of extensions and 404 doesn't terminate recursion
03:10 - Installing the latest version of FeroxBuster
04:40 - Running FeroxBuster with Force Recursion and multiple HTTP methods to discover user endpoints
06:45 - Downloading all users, creating a single json file, then using JQ to enable us to filter users
10:08 - Registering an account via the Signup endpoint. Analyzing errors to identify how it wants data
11:55 - Logging into the application in order to get a bearer token
…
Watch on YouTube ↗
(saves to browser)
Chapters (23)
Intro
0:49
Start of nmap
2:17
Talking about why dirbusting an API is different. Bruteforce methods instead o
3:10
Installing the latest version of FeroxBuster
4:40
Running FeroxBuster with Force Recursion and multiple HTTP methods to discover
6:45
Downloading all users, creating a single json file, then using JQ to enable us
10:08
Registering an account via the Signup endpoint. Analyzing errors to identify h
11:55
Logging into the application in order to get a bearer token
13:08
Using BurpSuite to add the Bearer Token to our HTTP Request and accessing /doc
15:10
Playing with the edit endpoint in the docs page
16:38
Testing for Mass Assignment, by editing our profile but adding the is_superuse
19:15
Using the file endpoint to extract files from the application
20:45
Creating a bash script to make extracting files easier for us
23:45
Using the LFI to examine the /proc/ directory to get cmdline of pid and ppid,
26:35
Examining the LFI Source Code to identify how the application works and JWT is
30:50
Trying to write files, discovering we need to edit our JWT
32:45
Creating a bash script that will update the webserver code to include another
41:50
Reverse shell returned, reviewing the logs to identify a password was entered
44:00
Trying to use Sudo and getting to PAM-Wordle
45:05
Analyzing timestamps on the filesystem with find to identify a PAM Module that
48:25
Running strings on the PAM Module, discovering the wordlist used for wordle is
49:00
Using the wordlist to cheat wordle and root the box
50:10
Examining the source code of the box to identify why it is vulnerable to the M
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Dungeon
IppSec
HHC2016 - Terminal Speedrun
IppSec
HHC2016 - Ads
IppSec
HHC2016 - Debug
IppSec
HHC2016 - Exception
IppSec
HHC2016 - Analytics
IppSec
HHC2016 - Getting Coins
IppSec
HackTheBox - Popcorn
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Tenten
IppSec
HackTheBox - CronOS
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Beep
IppSec
HackTheBox - Bastard
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Haircut
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Apocalyst
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - SolidState
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Bashed
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
HackTheBox - Nibbles
IppSec
DeepCamp AI