HackTheBox - AppSanity

  Рет қаралды 12,037

IppSec

IppSec

Күн бұрын

00:00 - Introduction
01:00 - Start of nmap, showing 5985 isn't in the top1000 so doing a full port scan
04:40 - Taking a look at the MedDigi website
07:07 - Taking a look at the Signup Request seeing AcctType
09:30 - Changing the AcctType to 2 and getting a different privilege
14:00 - VHost enumeration shows the portal.meddigi.htb domain, using our pre-existing session from the main page on this domain to bypass login
17:52 - Discovering SSRF in the Prescriptions page
19:40 - Discovering the File Upload requires a PDF but checks the magic bytes so we can make a PDF Header on our file and upload ASPX Web Shells
25:30 - Going back to the SSRF and discovering we can use time-based queries to identify ports listening on localhost
28:30 - Using FFUF to filter by duration to show us the requests that don't take a long time
38:22 - Discovering port 8080 shows our upload location, then navigating to it and getting a shell
42:22 - Finding DLL's the webserver uses, they are dotnet so copying them to a windows box so we can use dnspy and finding a password
45:40 - Using netexec to try the password against all users, then logging in as devdoc
53:00 - Looking at the ReportManagement.exe, opening it up in Ghidra
56:50 - Using chisel to forward port 100 to our box so we can access ReportManager
59:30 - Strings shows that externalupload.dll is right next to the Libraries string
1:00:15 - Looking at imports, see CreateProcessW, then going to where the binary calls that process
1:03:30 - Doing Dynamic Analysis with ProcMon, creating all the directories/files the program wants
1:18:50 - Eventually see it looking for files in the Libraries Directory when doing the upload command
1:21:45 - When externalupload.dll exists, we can see it doing a CreateProcess call, creating a DLL that sends a reverse shell
1:26:30 - When the DLL is in the libraries and we run upload, we get a shell

Пікірлер: 28
@pendragon3434
@pendragon3434 Ай бұрын
I would've been so lost after gaining the initial foothold with devdoc, I dont think I'd have noticed the service listening on port 100 and even if I did I feel like I would've never figured out what the program was doing or how ro exploit it's functionality. Hopefully one day ill be able to spot these little things even half as well as you do. Great walkthrough appreciate the work
@prudhvikonakalla9605
@prudhvikonakalla9605 2 ай бұрын
Waiting for your video sir....😊
@Omar-sr1ln
@Omar-sr1ln Ай бұрын
sar do the needful saaaaar
@charlesnathansmith
@charlesnathansmith 2 ай бұрын
The BUFFER_OVERFLOW results in process monitor are from the program getting buffer size info from the Win32 API If you want it to return some string value or something large, you make a call to wtv info API routine giving it a buffer and the buffer size, and if the size isn't large enough to hold the response, you get an overflow response code and information on the correct size that its needs to be. Usually the pattern used is to send the request with a 0 size, so it errors and gives you the correct size, then you can allocate enough space and make the call again with the correct size. This results in tons of overflow errors listed in the system messages, but it's just standard procedure
@AUBCodeII
@AUBCodeII Ай бұрын
59:46 you can also use -C3 instead of -A3 -B3. The "C" stands for "context" so it's easy to memorize.
@kalidsherefuddin
@kalidsherefuddin 2 ай бұрын
The great work
@for14556
@for14556 Ай бұрын
@IppSec - The inserted magicbytes are not going to break the synax of the reverse shell?
@ippsec
@ippsec Ай бұрын
Nope. ASPX ignores the characters that aren't part of its syntax. Just like PHP wouldnt execute whats before
@maniakdemi3548
@maniakdemi3548 2 ай бұрын
Yess
@J064n
@J064n 2 ай бұрын
Whats your terminal setup and shortcuts?
@puzzlepuzzlepuzzle760
@puzzlepuzzlepuzzle760 2 ай бұрын
May i ask what OS you normally run IppSec?
@MoxResearcher
@MoxResearcher 2 ай бұрын
Parrot
@AUBCodeII
@AUBCodeII 2 ай бұрын
Ipp Bandicoot
@dadamnmayne
@dadamnmayne 2 ай бұрын
ippflix and chill
@tg7943
@tg7943 2 ай бұрын
Push!
@Heisenberg696
@Heisenberg696 2 ай бұрын
why don't you use kali for just for one video please
@ippsec
@ippsec 2 ай бұрын
Go to the older videos, but really distro does not matter
@Beetlemiao
@Beetlemiao 2 ай бұрын
One thing I don’t understand is how you can tell that the report management is ran by a high privileged account, how do you check that before going that route?
@G0rlami
@G0rlami 2 ай бұрын
"tasklist /v" shows all the running processes + the users that they run under. When you run it you can usually see under which user every process runs . Side note*: Some entries are showing as "N/A" for the User, but that usually means that it's running under a system account.
@dedsec4002
@dedsec4002 2 ай бұрын
7:03 now we all knew how old is ippsec
@ippsec
@ippsec 2 ай бұрын
That actually wasn't my birth year :) Couple years off.
@AUBCodeII
@AUBCodeII 2 ай бұрын
Ipp is actually a 10 year old cyborg from Earth-10005, Universe-323.
@phamcongtoan1399
@phamcongtoan1399 Ай бұрын
I'm new,What is this channel about?😅
@azizhankaya8694
@azizhankaya8694 2 ай бұрын
You can't hack time..
@GajendraMahat
@GajendraMahat 2 ай бұрын
some gigs are hacking time by buying SSDs😂😂
HackTheBox   Zipping
1:02:06
IppSec
Рет қаралды 10 М.
HackTheBox - Pikatwoo
2:15:49
IppSec
Рет қаралды 18 М.
Taki Taki Tutorial💃 Where’re you from?🔥
00:14
Diana Belitskay
Рет қаралды 5 МЛН
Glow Stick Secret 😱 #shorts
00:37
Mr DegrEE
Рет қаралды 54 МЛН
1 класс vs 11 класс (рисунок)
00:37
БЕРТ
Рет қаралды 4,6 МЛН
This Tiny NAS Is FAST!
25:57
Everything Smart Home
Рет қаралды 8 М.
Вселенная и Специальная теория относительности.
3:51:36
ЗЛОЙ АНАЛИТИК ВСЕЛЕННОЙ.
Рет қаралды 6 МЛН
Install and Configure Lavalink Server | Lavalink v4
7:01
Raiden Community
Рет қаралды 942
HackTheBox - Gofer
1:04:47
IppSec
Рет қаралды 12 М.
Indiana Jones Video Game Retrospective | A Complete History and Review
3:46:24
I Finished A Video Game
Рет қаралды 5 МЛН
HackTheBox - Coder
2:09:39
IppSec
Рет қаралды 14 М.
HackTheBox - Intentions
1:21:40
IppSec
Рет қаралды 12 М.
How Airlines Make Money: The Economics of Business Class
12:15
TLDR Business
Рет қаралды 64 М.
HackTheBox - Pilgrimage
52:33
IppSec
Рет қаралды 12 М.
Taki Taki Tutorial💃 Where’re you from?🔥
00:14
Diana Belitskay
Рет қаралды 5 МЛН