UHC - Spooktrol
00:00 - Intro Hacking a Command and Control Server
01:07 - Running nmap and discovering two different SSH Instances, guessing one is Docker
03:30 - Looking at robots.txt which includes a link to the implant, looking at the error message and discovering its a cpp binary
05:30 - Using Wireshark to discover it makes a DNS Request to Spooktrol.htb, then walking through the C2's handshake
08:45 - Using BurpSuite and socat to proxy the connection of our binary
12:10 - Using BurpSuites find and replace to edit the Task that is getting to our C2
13:00 - Opening up the binary in Ghidra
14:15 - Looking at the decompiled output for the main function, which calls Spooky. Setting a break point on the XOR Function and discovering the first flag
16:45 - Discovering the Case Statement and analyzing Task number 1 (Exec)
19:50 - Stepping through each other task to discover what each function does
22:00 - The Perform Upload function builds a curl command
24:45 - Breaking after the curl string is assembled to show the full command it runs (Using BurpSuite to get to this part of the code)
27:50 - Accessing Task 3 a different way, breaking at the switch statement and editing the JMP.
32:45 - Editing the filename in the PUT Command to perform directory traversal and upload an SSH Key
34:30 - Logging into the C2, and inspecting the database to discover another beacon is running, which is on the Host Operating System
37:00 - Inserting a task into the database to ask the rogue beacon to execute a reverse shell for us
39:25 - Extra Content: Exploiting the box with no reverse engineering! Using an LFI to dump the source code to the application
41:40 - The server.py file has been leaked, grabbing all the other python scripts
43:20 - The application is now running on our box! Can identify the file upload functionality and how to exploit it.
51:45 - Extra Content: Going over the CPP code which shows how the implant works.
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
Why Businesses Quietly Accept Technology Friction as “Normal”
Medium · Cybersecurity
The Model You Just Downloaded Might Own Your Network — What I Learned Building Defenses Against AI…
Medium · Cybersecurity
I Found Backdoored AI Models on Hugging Face — And So Has Everyone Else Who Bothered to Look
Medium · Cybersecurity
The XSS Escalation Playbook: From Basic Reflection to DOM Breakouts
Medium · Cybersecurity
Chapters (20)
Intro Hacking a Command and Control Server
1:07
Running nmap and discovering two different SSH Instances, guessing one is Dock
3:30
Looking at robots.txt which includes a link to the implant, looking at the err
5:30
Using Wireshark to discover it makes a DNS Request to Spooktrol.htb, then walk
8:45
Using BurpSuite and socat to proxy the connection of our binary
12:10
Using BurpSuites find and replace to edit the Task that is getting to our C2
13:00
Opening up the binary in Ghidra
14:15
Looking at the decompiled output for the main function, which calls Spooky. S
16:45
Discovering the Case Statement and analyzing Task number 1 (Exec)
19:50
Stepping through each other task to discover what each function does
22:00
The Perform Upload function builds a curl command
24:45
Breaking after the curl string is assembled to show the full command it runs (
27:50
Accessing Task 3 a different way, breaking at the switch statement and editing
32:45
Editing the filename in the PUT Command to perform directory traversal and upl
34:30
Logging into the C2, and inspecting the database to discover another beacon is
37:00
Inserting a task into the database to ask the rogue beacon to execute a revers
39:25
Extra Content: Exploiting the box with no reverse engineering! Using an LFI t
41:40
The server.py file has been leaked, grabbing all the other python scripts
43:20
The application is now running on our box! Can identify the file upload funct
51:45
Extra Content: Going over the CPP code which shows how the implant works.
🎓
Tutor Explanation
DeepCamp AI