Jan 21, 2024, 10:32 PM
plseas explain how did u doit ? i cant open session or decoed the passowrd wrong
|
Analysis - HTB
by paven - Saturday January 20, 2024 at 01:22 PM
|
|
Jan 21, 2024, 10:32 PM
plseas explain how did u doit ? i cant open session or decoed the passowrd wrong
Jan 21, 2024, 10:47 PM
(Jan 21, 2024, 10:09 PM)peRd1 Wrote:(Jan 21, 2024, 09:41 PM)Alturis Wrote: I must be missing something.Name it sf_engine.dll Ah! Thank you. that finally worked. I had actually tried naming it sf_tcapi.dll before too but that didnt work obviously.
Jan 21, 2024, 10:48 PM
It has not been patched. I literally just got the tcapi.dll reverse shell to work by placing it in the snort_dynamicpreprocessor directory. Make sure you specify x64 with the reverse shell. I didn't specify x64 the first time and it did not work. good luck.
Jan 22, 2024, 12:29 AM
(Jan 21, 2024, 11:02 PM)n3wdefender Wrote:(Jan 21, 2024, 10:48 PM)zeroedbykrycek Wrote: It has not been patched. I literally just got the tcapi.dll reverse shell to work by placing it in the snort_dynamicpreprocessor directory. Make sure you specify x64 with the reverse shell. I didn't specify x64 the first time and it did not work. good luck. same here, finally got it to pop
Jan 22, 2024, 12:49 AM
i run winpeas but there is no credentials, just a spam of process that dont appear, can you give me some help?
Jan 22, 2024, 03:45 AM
finally owned root
Jan 22, 2024, 04:46 AM
how did you get this '*)(%26(objectClass=user)(description=FUZZ*)'
(Jan 21, 2024, 12:19 AM)jahman Wrote: Here is a script to dump the technician password:
Jan 22, 2024, 04:48 AM
Okay I got root with snort. But for the intended way - does anyone know how we can get wsmiths password so we can change soc_analysts password and then do DC-Sync for the win?
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Jan 22, 2024, 10:30 AM
(This post was last modified: Jan 22, 2024, 10:32 AM by hunter0003.)
// php-reverse-shell - A Reverse Shell implementation in PHP // Copyright © 2007 pentestmonkey@pentestmonkey.net // // This tool may be used for legal purposes only. Users take full responsibility // for any actions performed using this tool. The author accepts no liability // for damage caused by this tool. If these terms are not acceptable to you, then // do not use this tool. // // In all other respects the GPL version 2 applies: // // This program is free software; you can redistribute it and/or modify // it under the terms of the GNU General Public License version 2 as // published by the Free Software Foundation. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License along // with this program; if not, write to the Free Software Foundation, Inc., // 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. // // This tool may be used for legal purposes only. Users take full responsibility // for any actions performed using this tool. If these terms are not acceptable to // you, then do not use this tool. // // You are encouraged to send comments, improvements or suggestions to // me at pentestmonkey@pentestmonkey.net // // Description // ----------- // This script will make an outbound TCP connection to a hardcoded IP and port. // The recipient will be given a shell running as the current user (apache normally). // // Limitations // ----------- // proc_open and stream_set_blocking require PHP version 4.3+, or 5+ // Use of stream_select() on file descriptors returned by proc_open() will fail and return FALSE under Windows. // Some compile-time options are needed for daemonisation (like pcntl, posix). These are rarely available. // // Usage // ----- // See http://pentestmonkey.net/tools/php-reverse-shell if you get stuck.
Warning: Undefined variable $daemon in C:\inetpub\internal\dashboard\uploads\2.php on line 186 WARNING: Failed to daemonise. This is quite common and not fatal. Warning: Undefined variable $daemon in C:\inetpub\internal\dashboard\uploads\2.php on line 186 Successfully opened reverse shell to 10.10.X.X:2232 Warning: Undefined variable $daemon in C:\inetpub\internal\dashboard\uploads\2.php on line 186 ERROR: Shell process terminated will anyone help me out with this???
Jan 22, 2024, 10:42 AM
(This post was last modified: Jan 22, 2024, 11:09 AM by Aldimorningstar.)
(Jan 22, 2024, 10:30 AM)hunter0003 Wrote: // php-reverse-shell - A Reverse Shell implementation in PHP // Copyright © 2007 pentestmonkey@pentestmonkey.net // // This tool may be used for legal purposes only. Users take full responsibility // for any actions performed using this tool. The author accepts no liability // for damage caused by this tool. If these terms are not acceptable to you, then // do not use this tool. // // In all other respects the GPL version 2 applies: // // This program is free software; you can redistribute it and/or modify // it under the terms of the GNU General Public License version 2 as // published by the Free Software Foundation. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License along // with this program; if not, write to the Free Software Foundation, Inc., // 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. // // This tool may be used for legal purposes only. Users take full responsibility // for any actions performed using this tool. If these terms are not acceptable to // you, then do not use this tool. // // You are encouraged to send comments, improvements or suggestions to // me at pentestmonkey@pentestmonkey.net // // Description // ----------- // This script will make an outbound TCP connection to a hardcoded IP and port. // The recipient will be given a shell running as the current user (apache normally). // // Limitations // ----------- // proc_open and stream_set_blocking require PHP version 4.3+, or 5+ // Use of stream_select() on file descriptors returned by proc_open() will fail and return FALSE under Windows. // Some compile-time options are needed for daemonisation (like pcntl, posix). These are rarely available. // // Usage // ----- // See http://pentestmonkey.net/tools/php-reverse-shell if you get stuck. Go to the https://www.revshells.com/ from left side select PHP Ivan Sincek and on the shell type select cmd after that you can download the payload and upload the you should get the rev shell with this. (Jan 21, 2024, 10:56 PM)iamanraj28 Wrote: i got the root flag but when i enter it in htb its wrong one I got the same problem it says wrong flag |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 602 | 91,618 |
2 hours ago Last Post: sabero_exe |
||
| [FREE] CPTS 12 FLAGS | 68 | 1,953 |
11 hours ago Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,851 |
Today, 08:48 AM Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,620 |
Today, 05:08 AM Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,270 |
Yesterday, 02:10 PM Last Post: kkkato |
||