HTB - Mist
by ghostess256 - Friday March 29, 2024 at 10:25 PM
#31
(Mar 31, 2024, 03:59 AM)xxxbfacc Wrote: Shell as Brandon is next step

hint for the next step after this?
Reply
#32
what s next hint ?? bro

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#33
The script's primary function appears to be to update a set of shortcut files in a common application directory with a set from a user's AppData\links directory. Before copying, it checks if any of the existing shortcuts in the destination directory differ from those in the source. If they do, it opens the differing destination shortcut before proceeding to overwrite it (along with any other files) with the versions from the source directory.
Reply
#34
(Mar 30, 2024, 09:34 PM)bingle Wrote: got foothold earlier, to do so it's not that hard :
1 - go to mist.htb/data/modules/albums/albums_getimage.php?image=admin_backup.php
2 - crack the password
3 - go to http://mist.htb/admin.php?action=installmodule and upload zip with an exe and a webshell, then run the exe through the webshell
now i found out there is some sort of av, i can't download or run winpeas.

How can I tell that `admin_backup.php` exists? Thank you for providing the solution ideas.
Reply
#35
join our cybersec related server

https://app.hackthebox.com/public/teams/overview/6212
Reply
#36
(Mar 31, 2024, 06:43 AM)Th35t0rm Wrote: Any hint for shell as Brandon ?
Even then, from brandon, it's really faaar away from user, let along root.
Reply
#37
For brandon:
$source = "C:\Users\Brandon.Keywarp\AppData\links"
$destination = "C:\Common Applications"
$sourceFiles = Get-ChildItem -Path $source -Filter *.lnk

foreach ($file in $sourceFiles) {
$sourceFile = $file.FullName
$destFile = Join-Path -Path $destination -ChildPath $file.Name
if (Test-Path -Path $destFile) {
$sHash = (Get-FileHash -Path $sourceFile -Algorithm SHA256).Hash
$dHash = (Get-FileHash -Path $destFile -Algorithm SHA256).Hash
write-host $sHash
write-host $dHash
if ($sHash -ne $dHash) {
Invoke-Item $destFile
start-sleep -seconds 5
}
}
}

Means you can upload a crafted .lnk file(to the directory in the code above) to trigger a shell and to get the shell as brandon.
Reply
#38
I've had the shell as brandon for 3 hours but I can't find anything, has anyone made any progress? DM me if possible
Reply
#39
Managed to get ntlm for Brandon.
Was a stupid amount of work.
Not sure it's necessary.
Rabbit hole?
Reply
#40
we cannot crack the ntlm hash of brandon and we cannot enumerate smb shares (without creds)
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 4 474 2 hours ago
Last Post: Reminiscing
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 92,112 Yesterday, 06:48 PM
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 2,012 Yesterday, 09:54 AM
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 93,068 Yesterday, 08:48 AM
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,647 Yesterday, 05:08 AM
Last Post: popoler

Forum Jump:


 Users browsing this forum: 1 Guest(s)