11 Ergebnis(se) werden angezeigt

HTB: Return Walkthrugh

Enumeration NMAP Printer-Page The password field cannot be manipulated to reveal the password. However, the authentication target address can be customized. Set it to your own IP address and listen with netcat on the corresponding port. Exploitation With valid credentials, exploitation of the system can be started. Use Evil-WinRM to get CLI access: Check for …

HTB: Wifinetic Walkthrugh

Plattform: Hack the BoxLink: https://www.hackthebox.com/machines/wifineticDifficulty: Easy 🟠 Enumeration NMAP FTP This contains details regarding a planned system migration to Debian. The only file of significance is the backup file. The passwd file contains a potential username. Search for possibile passwords… Possibile SSH-Keys This involves SSH keys used by Dropbear, a lightweight SSH client/server commonly used on …

HTB: Knife Walkthrugh

Plattform: Hack the BoxLink: https://www.hackthebox.com/machines/knifeDifficulty: Easy 🟠 Enumeration As usual start with nmap.. Port 80 is open, the website which is hosted is just a static page nothing special to find there. So lets see whats running under the hood. PHP 8.1.0 DEV looks interesting, lets see if there is a vulnerability. https://github.com/flast101/php-8.1.0-dev-backdoor-rce/blob/main/README.md An exploit for …

HTB: Cap Walkthrough

Description Plattform: Hack the BoxLink: https://www.hackthebox.com/machines/capDifficulty: Easy 🟠 Enumeration NMAP Website There different topics in the side-menu. I tried some command injection but this didnt worked there. So move on to this „data-scan or security-scan“ which looked most interesting for me. After some digging around I found out that this application is vurnable to IDOR (insecure …

HTB: Chatterbox Walkthrough

Description Plattform: Hack the BoxLink: https://app.hackthebox.com/machines/123Difficulty: Medium 🟠 Enumeration NMAP We’ll find just two ports open: The ports indicate an application called Achat. A quick Google search reveals that Achat is a Windows-based chat application that supports direct messaging and file sharing within a local network. A working exploit can quickly be found using Searchsploit. …

HTB: Administrator Walkthrugh

Important Note Enumeration NMAP Share Enumeration User Enumeration Foothold To establish a foothold, use the credentials and spawn a shell on the system using Evil-WinRM. This provides a list of existing users on the system, but the relationship between them and your access is still missing. For this, BloodHound is the best tool to use. …

HTB: Cicada Walkthrugh

Enumeration NMAP SMB Anonymous login to the share /HR is possible. To view the file, its better to download it. The file contains a password for a user, but the user is not known. Searched for usernames in the infrastructure, but unfortunately found nothing. Attempting to enumerate usernames using Impacket. The following users can be …

HTB: Chemistry Walkthrugh

Enumeration NMAP Directory Listing I think that was a bug, because when I started the mashine again the next day, this directory was gone. CIF Analyzer Checking whether simple credentials like admin or admin:password work, but that is not the case. So, a separate user must be created to access the page. I tested uploading …

HTB: Sightless Walkthrugh

Enumeraton NMAP Website Nothing particularly interesting, except further down, where you are redirected to a subdomain via the button for SQLPAD. The tool appears to allow the execution of SQL queries. The version can be viewed by clicking the three dots in the top-right corner. Exploit There is a CVE associated with this version: CVE-2022-0944 …

HTB: Devel Walkthrugh

General Windows Mashinehttps://app.hackthebox.com/machines/3 Walkthru We start as usual with our nmap-scan We found FTP with enabled anonymous login, lets use this for us. Download all files from the FTP to our current directoy There are only the FIles from the web server. After a test if you can write on the FTP with MSFVENOM create …