[HTB] MonitorsThree
by celsius - Saturday August 24, 2024 at 05:26 PM
#41
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too
Reply
#42
(Aug 24, 2024, 09:56 PM)deku76 Wrote: 8200 ?? where did u found this port

once you get user, linpeas finds it
Reply
#43
(Aug 24, 2024, 10:20 PM)wtfduw Wrote: password for cacti admin:greencacti2001

not work on cacti its for the the original domain

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#44
Found out that you can bypass auth since you have access to the duplicati db in /opt/duplicati ... I didnt manage to get the exploit to work yet, but could lead to user?
Reply
#45
(Aug 24, 2024, 10:23 PM)osamy7593 Wrote:
(Aug 24, 2024, 10:20 PM)wtfduw Wrote: password for cacti admin:greencacti2001

not work on cacti its for the the original domain

It does connect on both.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#46
(Aug 24, 2024, 10:21 PM)noidontwant Wrote:
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too

The only thing that worked was Stacked Query, basically changing the admin password hash to something like md5 of '1234' and using that pw to login, but I don't see anything interesting and the hashes can't be cracked with rockyou and john.

What do you mean it's faster? Elaborate please
Reply
#47
(Aug 24, 2024, 10:39 PM)mascon Wrote:
(Aug 24, 2024, 10:21 PM)noidontwant Wrote:
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too

The only thing that worked was Stacked Query, basically changing the admin password hash to something like md5 of '1234' and using that pw to login, but I don't see anything interesting and the hashes can't be cracked with rockyou and john.

What do you mean it's faster? Elaborate please

yeah, stack queries isn't the right path. plus you ruin the box for everyone else

i could only do time based. But then, you only need a password hash. It's manageable to get within 5-10 minutes.
Reply
#48
(Aug 24, 2024, 10:44 PM)drunkp Wrote:
(Aug 24, 2024, 10:39 PM)mascon Wrote:
(Aug 24, 2024, 10:21 PM)noidontwant Wrote:
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too

The only thing that worked was Stacked Query, basically changing the admin password hash to something like md5 of '1234' and using that pw to login, but I don't see anything interesting and the hashes can't be cracked with rockyou and john.

What do you mean it's faster? Elaborate please

yeah, stack queries isn't the right path. plus you ruin the box for everyone else

i could only do time based. But then, you only need a password hash. It's manageable to get within 5-10 minutes.
How so? It literally took me over 2h to dump db name, and I guessed table and column name, and started dumping only password column.
EDIT: and I'm on a personalized instance
Reply
#49
(Aug 24, 2024, 10:39 PM)mascon Wrote:
(Aug 24, 2024, 10:21 PM)noidontwant Wrote:
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too

The only thing that worked was Stacked Query, basically changing the admin password hash to something like md5 of '1234' and using that pw to login, but I don't see anything interesting and the hashes can't be cracked with rockyou and john.

What do you mean it's faster? Elaborate please

I don't really know what u mean, but boolean-based blind is possible:
sqlmap -r req2.txt --dbms=mysql --technique=B -T users -D monitorsthree_db --dump
U get hashes and crack with hashcat -m 0.
Login to vhost cacti
Reply
#50
(Aug 24, 2024, 10:26 PM)hexforce Wrote: Found out that you can bypass auth since you have access to the duplicati db in /opt/duplicati ... I didnt manage to get the exploit to work yet, but could lead to user?

/opt/duplicati doesn't contain dbs

(Aug 24, 2024, 10:49 PM)noidontwant Wrote:
(Aug 24, 2024, 10:39 PM)mascon Wrote:
(Aug 24, 2024, 10:21 PM)noidontwant Wrote:
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too

The only thing that worked was Stacked Query, basically changing the admin password hash to something like md5 of '1234' and using that pw to login, but I don't see anything interesting and the hashes can't be cracked with rockyou and john.

What do you mean it's faster? Elaborate please

I don't really know what u mean, but boolean-based blind is possible:
sqlmap -r req2.txt --dbms=mysql --technique=B -T users -D monitorsthree_db --dump
U get hashes and crack with hashcat -m 0.
Login to vhost cacti

I meant changing admin pass would ruin it. but good that non-time based works

(Aug 24, 2024, 10:48 PM)mascon Wrote:
(Aug 24, 2024, 10:44 PM)drunkp Wrote:
(Aug 24, 2024, 10:39 PM)mascon Wrote:
(Aug 24, 2024, 10:21 PM)noidontwant Wrote:
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too

The only thing that worked was Stacked Query, basically changing the admin password hash to something like md5 of '1234' and using that pw to login, but I don't see anything interesting and the hashes can't be cracked with rockyou and john.

What do you mean it's faster? Elaborate please

yeah, stack queries isn't the right path. plus you ruin the box for everyone else

i could only do time based. But then, you only need a password hash. It's manageable to get within 5-10 minutes.
How so? It literally took me over 2h to dump db name, and I guessed table and column name, and started dumping only password column.
EDIT: and I'm on a personalized instance

hm, I used a command something like (when promted follow redirect, say N) : 

sqlmap -r req --second-url "http://10.10.11.xxx/reset-password.php"
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 20 2,450 2 hours ago
Last Post: op334
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 370 3 hours ago
Last Post: op334
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 369 91,791 9 hours ago
Last Post: sabbyahmed
  CBBH Write Ups hiddenhacker 22 6,215 Yesterday, 06:39 AM
Last Post: Usercomplex
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 86 7,798 Apr 28, 2026, 11:39 PM
Last Post: my4ri0d0

Forum Jump:


 Users browsing this forum: 1 Guest(s)