Jan 28, 2025, 07:25 AM
Currently stuck on the last send of the payload, how do you guys managed to combine both the GIF prefix filters and those required by the payload to work (i.e., zlib inflate)?
|
BigBang a Linux - Hard Machine
by StingEm - Saturday January 25, 2025 at 03:24 PM
|
|
Jan 28, 2025, 07:25 AM
Currently stuck on the last send of the payload, how do you guys managed to combine both the GIF prefix filters and those required by the payload to work (i.e., zlib inflate)?
Jan 28, 2025, 07:49 AM
(Jan 27, 2025, 07:08 PM)local Wrote: FInally i got shell can you share your scripts in order to get a reverse shell back? Thank you
Jan 28, 2025, 09:38 AM
(Jan 27, 2025, 11:51 PM)hijoxi6719 Wrote: I have been at it for hours at this point. I still can't understand why the fuck I am missing some file bytes at the end of LFI exploit. what we need to change, is the cnext-exploit.py is enough or we need to do some steps before running it?
Jan 28, 2025, 10:44 AM
At the last step impossible to get a root rev shell or bash SUID
r = requests.post("http://127.0.0.1:9090/command", headers={exploit like this : #!/bin/sh
Jan 28, 2025, 10:48 AM
(Jan 28, 2025, 06:00 AM)robonick Wrote: i just gained a foothold after suffering, how do i escape docker or laterally move to another host finally got a revshell for initial foothold, where should i go after this? i am not sure about this wp-config.php since we can already read it using LFI, can you please elaborate more?
Jan 28, 2025, 10:57 AM
(Jan 28, 2025, 09:38 AM)ffck Wrote:(Jan 27, 2025, 11:51 PM)hijoxi6719 Wrote: I have been at it for hours at this point. I still can't understand why the fuck I am missing some file bytes at the end of LFI exploit. The cnext-exploit.py is a base for the foothold. You need to modify its code, so you can leverage CVE-2023–26326 while sending payloads and receiving data from the server. Then you have to tweak your way around the exploit to bypass some mitigations introduced by the box's author and PHP filters just being a bitch.
Jan 28, 2025, 11:38 AM
(Jan 28, 2025, 10:48 AM)breached_idn Wrote:(Jan 28, 2025, 06:00 AM)robonick Wrote: i just gained a foothold after suffering, how do i escape docker or laterally move to another host nvm, got two users from wordpress's db, but it takes forever to crack the password.. stuck again, any hints?
Jan 28, 2025, 12:49 PM
(Jan 27, 2025, 04:15 PM)0xbeef Wrote:(Jan 27, 2025, 04:10 PM)kb2l Wrote:Thanks. So here make sure you are sending `application/json' content-type and run something like `chmod u+s /bin/bash` as output_file. Then rest you know what to do(Jan 27, 2025, 04:08 PM)0xbeef Wrote:these a /login endpoint(Jan 27, 2025, 03:58 PM)kb2l Wrote:(Jan 27, 2025, 03:54 PM)0xbeef Wrote: You need a token first then you can inject any command. Did you get the token ? how did you get the credentials for grafana? i can't use the default auth user:password
Jan 28, 2025, 02:50 PM
(Jan 27, 2025, 06:45 PM)missinglenk13 Wrote: from kali local will give both flags automatically for those who want it. You can also read the python to see how to do the privesc portion if need be. Thanks i will try that in a moment
Jan 28, 2025, 05:24 PM
(Jan 27, 2025, 07:12 PM)Taour Wrote: For those still stuck on the foothold Which exploit? cnext exploit? How? |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 602 | 91,778 |
9 hours ago Last Post: sabero_exe |
||
| [FREE] CPTS 12 FLAGS | 68 | 1,968 |
Yesterday, 09:54 AM Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,976 |
Yesterday, 08:48 AM Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,627 |
Yesterday, 05:08 AM Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,275 |
Apr 30, 2026, 02:10 PM Last Post: kkkato |
||