[HTB] Lantern
by RedTeamer - Saturday August 17, 2024 at 10:14 AM
#81
(Aug 18, 2024, 06:04 AM)jsvensson Wrote: i tried to load test.dll generated from msfvenom to /opt/components it worked but as i try to run it i get Bad IL Format

how could you load it in /opt/components?
Reply
#82
(Aug 18, 2024, 06:13 AM)fazemike Wrote:
(Aug 18, 2024, 06:04 AM)jsvensson Wrote: i tried to load test.dll generated from msfvenom to /opt/components it worked but as i try to run it i get Bad IL Format

how could you load it in /opt/components?

Using burp intercept and Upload content - first i generated long name for my dll for example:
aabaabaabaabaabaabaabaabaaboptEcomponentsEtest.dll
when intercepted change to:
../../../../../../../../../opt/components/test.dll

i think it have to hava same char numbers when you change name because other way i got error in json
Reply
#83
(Aug 18, 2024, 06:20 AM)jsvensson Wrote:
(Aug 18, 2024, 06:13 AM)fazemike Wrote:
(Aug 18, 2024, 06:04 AM)jsvensson Wrote: i tried to load test.dll generated from msfvenom to /opt/components it worked but as i try to run it i get Bad IL Format

how could you load it in /opt/components?

Using burp intercept and Upload content - first i generated long name for my dll for example:
aabaabaabaabaabaabaabaabaaboptEcomponentsEtest.dll
when intercepted change to:
../../../../../../../../../opt/components/test.dll

i think it have to hava same char numbers when you change name because other way i got error in json

We probably need to use the path traversal finding on port 80 to grab a valid .dll file, such as Logs.dll. decompile the code and insert our own reverse shell into it. Compile the dll file again so it matching the same kind of structure to avoid the bad format thingi.

maybe something like this: https://sid4hack.medium.com/malware-deve...48f5ebbafe
Reply
#84
I found this on official discussion forums

found a hint somewhere else for initial foothold. anyways, if anyone needs a very slight nudge look for web servers

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#85
Why are you all trying to get a windows shell in a Linux machine? this is .NET, not Windows.
Reply
#86
Is anybody know how to get shell ?
Reply
#87
(Aug 18, 2024, 06:04 AM)jsvensson Wrote: i tried to load test.dll generated from msfvenom to /opt/components it worked but as i try to run it i get Bad IL Format

I was able to upload to that path, but how did you get it to run?
Reply
#88
this is detailed thanks mate , i was stuck in the dll file part

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Reposting for credits
Reply
#89
(Aug 17, 2024, 07:44 PM)ent0xE Wrote: Additional Ports via SSRF (Skipper):

5000 (blazor)
8000 (same as on 80)

How to get there:

GET / HTTP/1.1
Host: lantern.htb
X-Skipper-Proxy: http://127.0.0.1:5000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1

on GET /_framework/blazor.boot.json are all blazor dlls,
via /_framework/InternaLantern.dll you can download them

seems to be blazor .Net decompiling again

how did u find the open ports?
I've run burp with intruder and sniper on x-skipper-proxy: http:/127.0.0.1:§port§ but this can't be the wright way.

Also, how did u find the _framework/blazor.boot.json and _framework/InternaLantern.dll?

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#90
(Aug 18, 2024, 06:44 AM)htbtester12 Wrote:
(Aug 18, 2024, 06:20 AM)jsvensson Wrote:
(Aug 18, 2024, 06:13 AM)fazemike Wrote:
(Aug 18, 2024, 06:04 AM)jsvensson Wrote: i tried to load test.dll generated from msfvenom to /opt/components it worked but as i try to run it i get Bad IL Format

how could you load it in /opt/components?

Using burp intercept and Upload content - first i generated long name for my dll for example:
aabaabaabaabaabaabaabaabaaboptEcomponentsEtest.dll
when intercepted change to:
../../../../../../../../../opt/components/test.dll

i think it have to hava same char numbers when you change name because other way i got error in json

We probably need to use the path traversal finding on port 80 to grab a valid .dll file, such as Logs.dll. decompile the code and insert our own reverse shell into it. Compile the dll file again so it matching the same kind of structure to avoid the bad format thingi.

maybe something like this: https://sid4hack.medium.com/malware-deve...48f5ebbafe

thanks for this
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 47 3,721 19 minutes ago
Last Post: Stiv1212
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 98 9,072 Yesterday, 08:05 PM
Last Post: Zacker90
  SVCHOST Injector 2026 opsecmaster67 0 94 Yesterday, 01:41 PM
Last Post: opsecmaster67
  Cold Seal 5.6 cracked Sensitive information can be exposed or stolen opsecmaster67 0 80 Yesterday, 01:38 PM
Last Post: opsecmaster67
  EagleRAT v2.5 Create backdoor access points opsecmaster67 0 74 Yesterday, 01:37 PM
Last Post: opsecmaster67

Forum Jump:


 Users browsing this forum: 1 Guest(s)