UHC - Spooktrol
00:00 - Intro Hacking a Command and Control Server
01:07 - Running nmap and discovering two different SSH Instances, guessing one is Docker
03:30 - Looking at robots.txt which includes a link to the implant, looking at the error message and discovering its a cpp binary
05:30 - Using Wireshark to discover it makes a DNS Request to Spooktrol.htb, then walking through the C2's handshake
08:45 - Using BurpSuite and socat to proxy the connection of our binary
12:10 - Using BurpSuites find and replace to edit the Task that is getting to our C2
13:00 - Opening up the binary in Ghidra
14:15 - Looking …
Watch on YouTube ↗
(saves to browser)
Chapters (20)
Intro Hacking a Command and Control Server
1:07
Running nmap and discovering two different SSH Instances, guessing one is Dock
3:30
Looking at robots.txt which includes a link to the implant, looking at the err
5:30
Using Wireshark to discover it makes a DNS Request to Spooktrol.htb, then walk
8:45
Using BurpSuite and socat to proxy the connection of our binary
12:10
Using BurpSuites find and replace to edit the Task that is getting to our C2
13:00
Opening up the binary in Ghidra
14:15
Looking at the decompiled output for the main function, which calls Spooky. S
16:45
Discovering the Case Statement and analyzing Task number 1 (Exec)
19:50
Stepping through each other task to discover what each function does
22:00
The Perform Upload function builds a curl command
24:45
Breaking after the curl string is assembled to show the full command it runs (
27:50
Accessing Task 3 a different way, breaking at the switch statement and editing
32:45
Editing the filename in the PUT Command to perform directory traversal and upl
34:30
Logging into the C2, and inspecting the database to discover another beacon is
37:00
Inserting a task into the database to ask the rogue beacon to execute a revers
39:25
Extra Content: Exploiting the box with no reverse engineering! Using an LFI t
41:40
The server.py file has been leaked, grabbing all the other python scripts
43:20
The application is now running on our box! Can identify the file upload funct
51:45
Extra Content: Going over the CPP code which shows how the implant works.
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Dungeon
IppSec
HHC2016 - Terminal Speedrun
IppSec
HHC2016 - Ads
IppSec
HHC2016 - Debug
IppSec
HHC2016 - Exception
IppSec
HHC2016 - Analytics
IppSec
HHC2016 - Getting Coins
IppSec
HackTheBox - Popcorn
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Tenten
IppSec
HackTheBox - CronOS
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Beep
IppSec
HackTheBox - Bastard
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Haircut
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Apocalyst
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - SolidState
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Bashed
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
HackTheBox - Nibbles
IppSec
DeepCamp AI