HTB - Drive [Discussion]
by 11231123 - Saturday October 14, 2023 at 06:37 PM
#11
(Oct 15, 2023, 01:05 AM)bololohaha Wrote: tomHands have a lot of passwords, but nothing worked c':

try again, tips: see passwd
Reply
#12
(Oct 15, 2023, 01:01 AM)h2m0nRe-d0b1e Wrote:
(Oct 15, 2023, 12:54 AM)nenandjabhata Wrote: I am trying to fuzz but not getting a good answer using my command:
└─# ffuf -u http://drive.htb/FUZZ/getFileDetail/ -w 3-digit.txt -fs 1542,0

there some functional unReserve, after press button u can see some private files "Select files to unReserve :" , but no can see content their
tips: press Reserve after upload u file and get correctly url for fuzz

Tried but same, i also used burp intruder to do it. but same, can you explain with steps please? Undecided
Reply
#13
(Oct 15, 2023, 01:21 AM)nenandjabhata Wrote:
(Oct 15, 2023, 01:01 AM)h2m0nRe-d0b1e Wrote:
(Oct 15, 2023, 12:54 AM)nenandjabhata Wrote: I am trying to fuzz but not getting a good answer using my command:
└─# ffuf -u http://drive.htb/FUZZ/getFileDetail/ -w 3-digit.txt -fs 1542,0

there some functional unReserve, after press button u can see some private files "Select files to unReserve :" , but no can see content their
tips: press Reserve after upload u file and get correctly url for fuzz

Tried but same, i also used burp intruder to do it. but same, can you explain with steps please? Undecided
did u create login and upload file?
Reply
#14
(Oct 15, 2023, 01:41 AM)h2m0nRe-d0b1e Wrote:
(Oct 15, 2023, 01:21 AM)nenandjabhata Wrote:
(Oct 15, 2023, 01:01 AM)h2m0nRe-d0b1e Wrote:
(Oct 15, 2023, 12:54 AM)nenandjabhata Wrote: I am trying to fuzz but not getting a good answer using my command:
└─# ffuf -u http://drive.htb/FUZZ/getFileDetail/ -w 3-digit.txt -fs 1542,0

there some functional unReserve, after press button u can see some private files "Select files to unReserve :" , but no can see content their
tips: press Reserve after upload u file and get correctly url for fuzz

Tried but same, i also used burp intruder to do it. but same, can you explain with steps please? Undecided
did u create login and upload file?

Yes. i have uploaded a file and reserved it. Now i was trying to FUZZ 3 digit number here : http://drive.htb/FUZZ/getFileDetail/.
Reply
#15
(Oct 15, 2023, 01:44 AM)nenandjabhata Wrote:
(Oct 15, 2023, 01:41 AM)h2m0nRe-d0b1e Wrote:
(Oct 15, 2023, 01:21 AM)nenandjabhata Wrote:
(Oct 15, 2023, 01:01 AM)h2m0nRe-d0b1e Wrote:
(Oct 15, 2023, 12:54 AM)nenandjabhata Wrote: I am trying to fuzz but not getting a good answer using my command:
└─# ffuf -u http://drive.htb/FUZZ/getFileDetail/ -w 3-digit.txt -fs 1542,0

there some functional unReserve, after press button u can see some private files "Select files to unReserve :" , but no can see content their
tips: press Reserve after upload u file and get correctly url for fuzz

Tried but same, i also used burp intruder to do it. but same, can you explain with steps please? Undecided
did u create login and upload file?

Yes. i have uploaded a file and reserved it. Now i was trying to FUZZ 3 digit number here : http://drive.htb/FUZZ/getFileDetail/.

see another url when Reserve self-file, and him fuzz (not getFileDetail)
Reply
#16
(Oct 15, 2023, 03:55 AM)FireGhost Wrote: i found a Message contains back*** but i cant find the that directory i need to use fuff ? how can i do next?

You found just one of a few messages you need. Try to enumerate the missing ones, and it will be easy.
Reply
#17
(Oct 15, 2023, 02:23 AM)bololohaha Wrote: is option 5 from the CLI the correct path to root, or this is just another loophole?
 which creds have you use on cli?
Reply
#18
(Oct 15, 2023, 04:11 AM)D347H Wrote:
(Oct 15, 2023, 02:23 AM)bololohaha Wrote: is option 5 from the CLI the correct path to root, or this is just another loophole?
 which creds have you use on cli?

You can RE it, or just use strings :v
Reply
#19
(Oct 15, 2023, 02:23 AM)bololohaha Wrote: is option 5 from the CLI the correct path to root, or this is just another loophole?
Yes. I'd say yes, I still didn't finish the box. There seem to be at least 2 ways to root the box. 
Either via binary exploitation (BOF or something but I see somehow need to get past the stack smashing checks, I was thinking about ret to libc approach but couldn't get it done yet.), or via the help of loading some external library and sql statements. Regardless, the CLI binary's function 5 needs to get abused to its tears, where I am stumped pretty much......

As for the user and foothold. Read previous posts. Find out how to read other files. FUZZ for valid entries where it gives unauthorized but files exists, etc. Then you will see how to actually read those files that exist. After that step foothold is right away. Then moving laterally to a different user. After shell, on the server you will find some zips of sqlite db backups - which will contain pwd hashes! You need to get into the gitea that is filtered (seen from nmap scan RIGHT??). Port fwd that once you have foothold obviously. In the gitea once logged you will see right away the archive password. Unzip and his is how you find sql hashes. Crack them. Be smart. Use tools appropriately. Check all backups since not every credential will work but you'll get the user. And done.
Reply
#20
(Oct 15, 2023, 10:39 AM)peRd1 Wrote:
(Oct 15, 2023, 02:23 AM)bololohaha Wrote: is option 5 from the CLI the correct path to root, or this is just another loophole?
Yes. I'd say yes, I still didn't finish the box. There seem to be at least 2 ways to root the box. 
Either via binary exploitation (BOF or something but I see somehow need to get past the stack smashing checks, I was thinking about ret to libc approach but couldn't get it done yet.), or via the help of loading some external library and sql statements. Regardless, the CLI binary's function 5 needs to get abused to its tears, where I am stumped pretty much......

As for the user and foothold. Read previous posts. Find out how to read other files. FUZZ for valid entries where it gives unauthorized but files exists, etc. Then you will see how to actually read those files that exist. After that step foothold is right away. Then moving laterally to a different user. After shell, on the server you will find some zips of sqlite db backups - which will contain pwd hashes! You need to get into the gitea that is filtered (seen from nmap scan RIGHT??). Port fwd that once you have foothold obviously. In the gitea once logged you will see right away the archive password. Unzip and his is how you find sql hashes. Crack them. Be smart. Use tools appropriately. Check all backups since not every credential will work but you'll get the user. And done.

I am trying to crack hashes using John Because my hashcat not work, Please can you suggest any tools
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,545 32 minutes ago
Last Post: popoler
  [FREE] CPTS 12 FLAGS pulsebreaker 66 1,795 7 hours ago
Last Post: vlka
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 370 92,598 Yesterday, 05:05 PM
Last Post: lifolifo007
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,218 Yesterday, 02:10 PM
Last Post: kkkato
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 417 Apr 29, 2026, 10:36 PM
Last Post: op334

Forum Jump:


 Users browsing this forum: 1 Guest(s)