Aug 06, 2024, 12:19 PM
gg everyone was a really good boxe to play all
|
Ghost - Insane
by f4k3h4ck3r - Saturday July 13, 2024 at 03:43 PM
|
|
Aug 06, 2024, 12:19 PM
gg everyone was a really good boxe to play all
Aug 12, 2024, 09:48 PM
For some reason I am getting this when trying to execute the command, any thoughts ..?
SQL (GHOST\florence.ramirez guest@master)> use_link [PRIMARY] [-] ERROR(PRIMARY): Line 1: Login failed for user 'NT AUTHORITY\ANONYMOUS LOGON'.
Aug 18, 2024, 01:07 PM
(Aug 12, 2024, 09:48 PM)MhmmdSr5 Wrote: For some reason I am getting this when trying to execute the command, any thoughts ..? Because the htb admin Tightened MSSQL Permissions Look machine's changelog tab
Aug 28, 2024, 02:56 PM
(Jul 15, 2024, 09:59 AM)wh1t3_r4bb1t Wrote:(Jul 15, 2024, 08:32 AM)bmoon10 Wrote:(Jul 15, 2024, 07:40 AM)wh1t3_r4bb1t Wrote: If someone stuck with mssql, in thread missed 2 things: Appears PRIMARY is no loner a linked server. Fails to login
Aug 28, 2024, 03:02 PM
(Aug 28, 2024, 02:56 PM)kewlcat002 Wrote:(Jul 15, 2024, 09:59 AM)wh1t3_r4bb1t Wrote:(Jul 15, 2024, 08:32 AM)bmoon10 Wrote:(Jul 15, 2024, 07:40 AM)wh1t3_r4bb1t Wrote: If someone stuck with mssql, in thread missed 2 things: You mast do sql injection command from web app linked https://core.ghost.htb:8443/ I solved it in this way
Sep 15, 2024, 08:30 AM
(Jul 13, 2024, 09:40 PM)Uliys Wrote: Anything interesting in http://ghost.htb:8008/ghost/api/content/posts ? if you get the access to the gitea dev repo you will find that these end point led to LFI vuln just use that public API key and pass commands using an extra parameter in the url
Nov 17, 2024, 01:56 PM
(Aug 28, 2024, 03:02 PM)Aner Wrote:(Aug 28, 2024, 02:56 PM)kewlcat002 Wrote:(Jul 15, 2024, 09:59 AM)wh1t3_r4bb1t Wrote:(Jul 15, 2024, 08:32 AM)bmoon10 Wrote:(Jul 15, 2024, 07:40 AM)wh1t3_r4bb1t Wrote: If someone stuck with mssql, in thread missed 2 things: I see. Are you supposed to execute xp_cmdshell in "https://core.ghost.htb:8443/"?
Nov 24, 2024, 01:13 AM
Hey guys. After the patch, there is no password for florence.ramirez in docker-entrypoint.sh file. Anyone know how to goon?
Dec 23, 2024, 06:38 PM
(Nov 24, 2024, 01:13 AM)tmpuserbreach Wrote: Hey guys. After the patch, there is no password for florence.ramirez in docker-entrypoint.sh file. Anyone know how to goon? You are apparently not supposed to use it anymore but just ssh straight into the linux-dev machine command: ssh florence.ramirez@ghost.htb@dev-workstation in here there is a krb5cc_50 in the tmp folder. You need to extract this back to the first linux machine and then back to your attacker machine to use it like so: export KRB5CCNAME=krb5cc_50
Dec 25, 2024, 09:34 AM
After searching for a long time, I finally found this place. It's great.
|
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] CPTS 12 FLAGS | 68 | 1,931 |
6 hours ago Last Post: VictorPipeau |
||
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 601 | 91,530 |
6 hours ago Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,796 |
7 hours ago Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,611 |
10 hours ago Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,268 |
Yesterday, 02:10 PM Last Post: kkkato |
||