28 Ergebnis(se) werden angezeigt

HTB – Titanic

Description Plattform: Hack the BoxLink: https://www.hackthebox.com/machines/titanicDifficulty: easy 🟢 Enumeration NMAP Booking-Modul A booking module is provided, which generates a JSON file after the form is completed. If you examine the download request, it invites a Local File Inclusion (LFI) vulnerability. Exploitation Local File Inclusion With this, it realy ease to get the user-flag: Subdomain Remote File-Inclusion …

THM: Daily Bugle Walkthrugh

Description Plattform: TryHackMeLink: https://tryhackme.com/room/dailybugleDifficulty: Hard 🟠 Enumeration NMAP Exploit CVE-2017-8917 The running Joomla CMS seems to be vulnerabile against the CVE-2017-8917 which is an SQLi vulnerability. On Github an working exploit can be found: https://github.com/stefanlucas/Exploit-Joomla Equipped with the exploit, one can exfiltrate superuser access credentials. The hash can be cracked easily with hashcat or john. …

THM: Mothers Secret Walkthrugh

Description Plattform: TryHackMeLink: https://tryhackme.com/room/codeanalysisDifficulty: Medium 🟠 Codeanalysis This router is based on the POST request type and uses a function called isYaml() to check whether the file parameter (here file_path) is a YAML file or not. If the return value is „Yes,“ the file is read, and the JavaScript data is returned to the client …

HTB: Administrator Walkthrugh

Important Note Enumeration NMAP Share Enumeration User Enumeration Foothold To establish a foothold, use the credentials and spawn a shell on the system using Evil-WinRM. This provides a list of existing users on the system, but the relationship between them and your access is still missing. For this, BloodHound is the best tool to use. …

HTB: Cicada Walkthrugh

Enumeration NMAP SMB Anonymous login to the share /HR is possible. To view the file, its better to download it. The file contains a password for a user, but the user is not known. Searched for usernames in the infrastructure, but unfortunately found nothing. Attempting to enumerate usernames using Impacket. The following users can be …

HTB: Chemistry Walkthrugh

Enumeration NMAP Directory Listing I think that was a bug, because when I started the mashine again the next day, this directory was gone. CIF Analyzer Checking whether simple credentials like admin or admin:password work, but that is not the case. So, a separate user must be created to access the page. I tested uploading …

HTB: Sightless Walkthrugh

Enumeraton NMAP Website Nothing particularly interesting, except further down, where you are redirected to a subdomain via the button for SQLPAD. The tool appears to allow the execution of SQL queries. The version can be viewed by clicking the three dots in the top-right corner. Exploit There is a CVE associated with this version: CVE-2022-0944 …

Offsec: InfosecPrep Walkthrugh

This is my first mashine from Offsec regarding for PNPT and OSCP preparation. Recently I try to produce more content and get again more in preparation for the exams. First of all we start with our basic NMAP-Scan: We see port 80 is open with an Apache-Webserver running, so there must be a webpage. We …

HTB: Devel Walkthrugh

General Windows Mashinehttps://app.hackthebox.com/machines/3 Walkthru We start as usual with our nmap-scan We found FTP with enabled anonymous login, lets use this for us. Download all files from the FTP to our current directoy There are only the FIles from the web server. After a test if you can write on the FTP with MSFVENOM create …

HTB: Active Walkthrugh

General Active Directory Maschinehttps://app.hackthebox.com/machines/148 Walkthru First of all perform nmap-scan SMB 445 is open, lets check if we can login with anonymous-login Works! Lets login to the directory that we saw Download all files, and check them locally We found some information in the Groups.xml. Lets try to decrypt the hash. Looks like we found …