HackTheBox - Clicker

  Рет қаралды 10,707

IppSec

IppSec

Күн бұрын

00:00 - Introduction
01:02 - Start of nmap and discovering NFS, which is hosting source code to the webserver
05:50 - Showing off the NFSClient Golang binary by Mubix, does not work here because NFS is Read-only
07:40 - Viewing the website for the first time, so we have an idea of what source code we are looking at
09:00 - Looking at the source code, Snyk doesn't give us anything
11:45 - Looking at database queries and finding a Mass Assignment Vulnerability
13:30 - Discovering we need to assign ourselves to Admin
14:45 - Using a line break, to bypass the check against the Key, allowing us to pass in the Role
17:48 - Showing another way to set our Role To Admin through SQL Injection in the Value
21:52 - Viewing the Administration page, discovering how the export function works
25:00 - We can place PHP Code in NICKNAME for our user, which then the export function writes to a php file which then executes
30:12 - Running LinPEAS, discovering a SetUID Binary (execute_query)
36:00 - Examining execute_query in Ghidra, discovering a File Disclosure Vulnerability
42:00 - Grabbing the SSH Key for Jack
44:27 - Jack can sudo run /opt/monitor.sh, and set the environment. We can use LD_PRELOAD to hijack dynamically compiled binaries.
50:15 - Showing the intended way by setting a proxy to CURL, allowing us to change the data the server sends and trigger an XXE

Пікірлер: 18
@olivierlasne2346
@olivierlasne2346 3 ай бұрын
If I remembrer correctly (I did this box a few weeks back), the reason why you can't read the file at 41:00 is that the buffer for the command is fairly small. So the path your are giving is trunckated which result in an error. It works for /etc/passwd and ./ssh/id_rsa because the full path are small enough for this vuln.
@tntxqx8281
@tntxqx8281 3 ай бұрын
nice upload ippsec we love ya
@george___43
@george___43 3 ай бұрын
Love these videos!!
@peterarnell8112
@peterarnell8112 3 ай бұрын
That’s awesome, I bypassed the role filter by using &/**/role=Admin
@user-js4wi8mp7m
@user-js4wi8mp7m 3 ай бұрын
I missed the filter bypass! I though I could just change the admin's password in save game since it allows you to modify any field in players but that didn't work.
@StevenHokins
@StevenHokins 2 ай бұрын
Very good video, thank you ❤
@AUBCodeII
@AUBCodeII 3 ай бұрын
You should've picked Mercy, Ipp
@tiburon239
@tiburon239 3 ай бұрын
🎉🎉🎉
@monKeman495
@monKeman495 3 ай бұрын
role param is useless for normal user i'm curious is it passes as intended param when admin authenticates
@thebear3347
@thebear3347 3 ай бұрын
What do you use for screen recording?
@Agr0dan
@Agr0dan 3 ай бұрын
Can you go into more detail about what you meant regarding private temp in systemd at 39:41?
@ippsec
@ippsec 3 ай бұрын
Services ran under systemd have a jailed temp folder generally. So Apache’s /tmp/ is different from MySQL’s /tmp/
@tg7943
@tg7943 3 ай бұрын
Push!
@king09426
@king09426 2 ай бұрын
Is this OSCP level?
@angelindisguise4638
@angelindisguise4638 2 ай бұрын
Not quite, this is easier than some of the mediums currently active this season which I would say are OSCP level
@alanisam6220
@alanisam6220 3 ай бұрын
First
@Ivo--
@Ivo-- 3 ай бұрын
I got root in a third way, with PERL5OPT and PERL5DB. You put -d in OPT and with DB you can then run arbitrary perl code.
@AUBCodeII
@AUBCodeII 2 ай бұрын
This is what happens when you don't use the line unsetenv("LD_PRELOAD");: bash: syntax error near unexpected token `)' root@clicker:/tmp# pwd /tmp root@clicker:/tmp# free -h bash: fork: retry: Resource temporarily unavailable bash: fork: retry: Resource temporarily unavailable bash: fork: retry: Resource temporarily unavailable bash: fork: retry: Resource temporarily unavailable bash: fork: Resource temporarily unavailable root@clicker:/tmp# root@clicker:/tmp# free -h bash: fork: retry: Resource temporarily unavailable bash: fork: retry: Resource temporarily unavailable
HackTheBox - Shoppy
28:38
IppSec
Рет қаралды 28 М.
HackTheBox - Pollution
1:12:41
IppSec
Рет қаралды 15 М.
Кәріс тіріма өзі ?  | Synyptas 3 | 8 серия
24:47
kak budto
Рет қаралды 1,4 МЛН
Nonomen funny video😂😂😂 #magic
00:27
Nonomen ノノメン
Рет қаралды 16 МЛН
Buy Feastables, Win Unlimited Money
00:51
MrBeast 2
Рет қаралды 62 МЛН
HackTheBox - BountyHunter
42:48
IppSec
Рет қаралды 29 М.
HackTheBox - Gofer
1:04:47
IppSec
Рет қаралды 12 М.
HackTheBox - CozyHosting
37:18
IppSec
Рет қаралды 11 М.
HackTheBox - PC
29:32
IppSec
Рет қаралды 13 М.
HackTheBox   Zipping
1:02:06
IppSec
Рет қаралды 10 М.
HackTheBox - MonitorsTwo
25:13
IppSec
Рет қаралды 15 М.
HackTheBox - Sandworm
46:53
IppSec
Рет қаралды 10 М.
HackTheBox   RegistryTwo
2:06:46
IppSec
Рет қаралды 10 М.
HackTheBox - Visual
41:25
IppSec
Рет қаралды 10 М.
HackTheBox - Coder
2:09:39
IppSec
Рет қаралды 14 М.