Jan 27, 2025, 11:42 PM
this is a hosting build?
|
BigBang a Linux - Hard Machine
by StingEm - Saturday January 25, 2025 at 03:24 PM
|
|
Jan 27, 2025, 11:42 PM
this is a hosting build?
Jan 27, 2025, 11:51 PM
(This post was last modified: Jan 28, 2025, 12:00 AM by hijoxi6719.)
I have been at it for hours at this point. I still can't understand why the fuck I am missing some file bytes at the end of LFI exploit.
Any thoughts? (Jan 27, 2025, 09:44 PM)Marker Wrote: can someone provide links to CVEs about this machine foothold? There are two CVEs to be chained for foothold with this machine, the first one is CVE-2023–26326 (Writeup: https://medium.com/tenable-techblog/word...ecb5575ed8) The second one is CVE-2024-2961, it even uses the previous one as a demonstration for the deserialization (Writeup: https://www.ambionics.io/blog/iconv-cve-2024-2961-p1, PoC: https://github.com/ambionics/cnext-exploits) The exploit needs to be tweaked accordingly to work properly.
Jan 28, 2025, 12:14 AM
I'm in the docker, how do i get to escape
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Jan 28, 2025, 12:23 AM
Quick question, how did you guys actually identify the command injection in the send_image function? Did you fuzz it or was there source code somewhere that you read?
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Jan 28, 2025, 12:31 AM
(Jan 27, 2025, 07:12 PM)Taour Wrote: For those still stuck on the foothold How about the zlib replacement? is there any workaround on it?
Jan 28, 2025, 12:36 AM
(Jan 28, 2025, 12:33 AM)ph3l1x0r Wrote:(Jan 28, 2025, 12:23 AM)QuackTheCode Wrote: Quick question, how did you guys actually identify the command injection in the send_image function? Did you fuzz it or was there source code somewhere that you read? Sorry, I meant in the last part regarding the app running on port 9090 with Smali files and all that stuff This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Jan 28, 2025, 02:43 AM
(Jan 27, 2025, 09:02 AM)luckystars0612 Wrote:(Jan 27, 2025, 07:52 AM)0x410x420x41 Wrote: Hmm if i try with one of the libc.so.6 png files i am getting "ELFParseError: expected 8, found 5"I think you can try my way. Firstly, you need download libc.so.6 from box machine, then use my script to fix missing header, then use this libc to get shell. Thank you this was really very helpful! I was able to get the RCE to work with this! This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
i just gained a foothold after suffering, how do i escape docker or laterally move to another host
(Jan 28, 2025, 06:00 AM)robonick Wrote: i just gained a foothold after suffering, how do i escape docker or laterally move to another host ah nvm, for tho who still struggle with how to get the user flag after getting a foothold, just read wp-config.php. there is credential for logging into the db and the host ip. so you need to port forward to that host, access the db, and crack the user hash in it, after that using the credential to logging into SSH.
Jan 28, 2025, 07:06 AM
(This post was last modified: Jan 28, 2025, 07:08 AM by breached_idn.)
(Jan 28, 2025, 02:43 AM)fl00d777 Wrote:(Jan 27, 2025, 09:02 AM)luckystars0612 Wrote:(Jan 27, 2025, 07:52 AM)0x410x420x41 Wrote: Hmm if i try with one of the libc.so.6 png files i am getting "ELFParseError: expected 8, found 5"I think you can try my way. Firstly, you need download libc.so.6 from box machine, then use my script to fix missing header, then use this libc to get shell. Did I understand this correctly? we download the libc.so.6 (in form of .png) file from machine, located on : /lib/x86_64-linux-gnu/libc.so.6 using lfi for arbitrary read files but the script also need reference_libc? what is this libc file?
Jan 28, 2025, 07:20 AM
(Jan 28, 2025, 07:06 AM)breached_idn Wrote:(Jan 28, 2025, 02:43 AM)fl00d777 Wrote:(Jan 27, 2025, 09:02 AM)luckystars0612 Wrote:(Jan 27, 2025, 07:52 AM)0x410x420x41 Wrote: Hmm if i try with one of the libc.so.6 png files i am getting "ELFParseError: expected 8, found 5"I think you can try my way. Firstly, you need download libc.so.6 from box machine, then use my script to fix missing header, then use this libc to get shell. yes the .png (which include libc.so.6 inside) is download via arbitrary file read and the reference_libc is actually the valid libc.so.6 on your own machine also locate at /lib/x86_64-linux-gnu/libc.so.6, just copy it to your current working directory and then run the script where the .png file exist there too. |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 602 | 91,772 |
7 hours ago Last Post: sabero_exe |
||
| [FREE] CPTS 12 FLAGS | 68 | 1,966 |
Yesterday, 09:54 AM Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,894 |
Yesterday, 08:48 AM Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,622 |
Yesterday, 05:08 AM Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,275 |
Apr 30, 2026, 02:10 PM Last Post: kkkato |
||