Alchemy - HTB Lab
by kewlcat002 - Monday September 23, 2024 at 12:21 PM
#31
(Oct 20, 2024, 03:36 PM)Krapt Wrote:
(Sep 30, 2024, 04:36 AM)0rch1d Wrote:
(Sep 29, 2024, 09:15 AM)Goku_black Wrote: what was the attack path? how did you compromised these machines? any hints?

Web01:
  • user: focus on requests then git
  • root: common CVE
Scada:
  • user: try logging in
  • root: didn't do it yet
LDAP:
  • user: enumerate with what you have
  • root: look at user accounts
Web02:
  • user: CVE on web
  • root: enumerate your user
WS02:
  • user: spray and pray then use what's in the accessible service
  • root: enumerate common user files then use what you find to take advantage of privs

I'll put updates here when I get access to WS01, FW, EW, and Printer.

I’m still stuck on Web01, can anyone please give me more hints onto what I should be looking at?
Look closely to git commits... You will find credentials for SSH
Reply
#32
(Oct 20, 2024, 07:05 PM)Heilel Wrote:
(Oct 20, 2024, 03:36 PM)Krapt Wrote:
(Sep 30, 2024, 04:36 AM)0rch1d Wrote:
(Sep 29, 2024, 09:15 AM)Goku_black Wrote: what was the attack path? how did you compromised these machines? any hints?

Web01:
  • user: focus on requests then git
  • root: common CVE
Scada:
  • user: try logging in
  • root: didn't do it yet
LDAP:
  • user: enumerate with what you have
  • root: look at user accounts
Web02:
  • user: CVE on web
  • root: enumerate your user
WS02:
  • user: spray and pray then use what's in the accessible service
  • root: enumerate common user files then use what you find to take advantage of privs

I'll put updates here when I get access to WS01, FW, EW, and Printer.

I’m still stuck on Web01, can anyone please give me more hints onto what I should be looking at?
Look closely to git commits... You will find credentials for SSH

I have a feeling that ur hint is based on the next step which is being logged in with one of the users that are on the gogs service Smile , I’m not even there, if that’s what u meant by ur hint then plz let me know.
Reply
#33
Quote:I have a feeling that ur hint is based on the next step which is being logged in with one of the users that are on the gogs service Smile , I’m not even there, if that’s what u meant by ur hint then plz let me know.

Look closely to the login functionality in web proxy (burp suite) 
There should parameter related to LDAP that you able to tamper.
Idea quite simple - try to listen 389 port on your kali and put your IP to the parameter when log-in ...
Reply
#34
(Oct 21, 2024, 03:54 PM)Heilel Wrote:
Quote:I have a feeling that ur hint is based on the next step which is being logged in with one of the users that are on the gogs service Smile , I’m not even there, if that’s what u meant by ur hint then plz let me know.

Look closely to the login functionality in web proxy (burp suite) 
There should parameter related to LDAP that you able to tamper.
Idea quite simple - try to listen 389 port on your kali and put your IP to the parameter when log-in ...

Huge thanks ❤️
Reply
#35
(Oct 21, 2024, 03:54 PM)Heilel Wrote:
Quote:I have a feeling that ur hint is based on the next step which is being logged in with one of the users that are on the gogs service Smile , I’m not even there, if that’s what u meant by ur hint then plz let me know.

Look closely to the login functionality in web proxy (burp suite) 
There should parameter related to LDAP that you able to tamper.
Idea quite simple - try to listen 389 port on your kali and put your IP to the parameter when log-in ...

Or use Responder to catch the login
Reply
#36
Understand the responder part, but I can't for the life of me figure out what to change in the login flow. Keep hitting response code 500 and nothing to show for it. is it the lo*********ce parameter that needs to be changed to IP?
Reply
#37
Guys. Use Chisel, Socat. in SCADA, basic enumeration and you will find a really piece of cake to make a privilege escalation.
Reply
#38
(Oct 21, 2024, 09:09 PM)xorraxrax Wrote: Understand the responder part, but I can't for the life of me figure out what to change in the login flow. Keep hitting response code 500 and nothing to show for it. is it the lo*********ce parameter that needs to be changed to IP?

look at the login for the normal site, there is some parameter in the login request that is asking to be hacked...
Reply
#39
Hint for WS02 -> list shares, maybe there are something you can do with the permission you have.
Reply
#40
Need a hint on The secret is out! flag for ALCHEMY-LAUTERING-PLC . It seems that need look something related to inkate process. But strugling to understand what need to search and what we should to do.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 370 92,208 1 hour ago
Last Post: lifolifo007
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,191 4 hours ago
Last Post: kkkato
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 20 2,496 Yesterday, 11:06 PM
Last Post: op334
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 399 Yesterday, 10:36 PM
Last Post: op334
  CBBH Write Ups hiddenhacker 22 6,229 Yesterday, 06:39 AM
Last Post: Usercomplex

Forum Jump:


 Users browsing this forum: 2 Guest(s)