[HTB] MonitorsThree
by celsius - Saturday August 24, 2024 at 05:26 PM
#51
(Aug 24, 2024, 10:49 PM)noidontwant Wrote:
(Aug 24, 2024, 10:39 PM)mascon Wrote:
(Aug 24, 2024, 10:21 PM)noidontwant Wrote:
(Aug 24, 2024, 10:06 PM)teky Wrote: can somebody drop the hash this shit is taking forever

dont do time-based, other injection methods work too

The only thing that worked was Stacked Query, basically changing the admin password hash to something like md5 of '1234' and using that pw to login, but I don't see anything interesting and the hashes can't be cracked with rockyou and john.

What do you mean it's faster? Elaborate please

I don't really know what u mean, but boolean-based blind is possible:
sqlmap -r req2.txt --dbms=mysql --technique=B -T users -D monitorsthree_db --dump
U get hashes and crack with hashcat -m 0.
Login to vhost cacti
I'm not sure how you detected it, probably because you supplied the request from burp and I did it manually. I did level 5 and risk 3, and it only found time based and stacked query. I managed to dump it after an absurdly long time and crack with john, actually I'm almost at user
Reply
#52
can't import package in cacti why

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#53
Use the metasploit module : exploit/multi/http/cacti_package_import_rce
You'll be able to land a shell as www-data

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#54
(Aug 24, 2024, 11:14 PM)osamy7593 Wrote: can't import package in cacti why

multi/http/cacti_package_import_rce
Reply
#55
(Aug 24, 2024, 11:18 PM)wtfduw Wrote: Use the metasploit module : exploit/multi/http/cacti_package_import_rce
You'll be able to land a shell as www-data

for all people
that the module does not install for msfconsole
use this
and shell rm /tmp....
https://github.com/Cacti/cacti/security/...-g5qc-pj88
i got a shell with this

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | https://breachforums.ai/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#56
any hints for after www-data can get to user
Reply
#57
(Aug 24, 2024, 11:27 PM)deku76 Wrote: any hints for after www-data can get to user

marcus has a user account in cacti.
Reply
#58
this got me shell https://github.com/rapid7/metasploit-fra...pull/19196

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | https://breachforums.ai/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#59
http://127.0.0.1:8200/login.html
Once you gain access to the user Marcus, there is a port that can be accessed with the command
ssh -L 8200:127.0.0.1:8200 marcus@10.10.11.30 -i sessions/id_rsa_marcus
Smile
Reply
#60
the user flag was so fucking easy wtf ahahahahahaha
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 367 90,895 6 hours ago
Last Post: Anon141234
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 85 7,681 Today, 05:35 AM
Last Post: Fr1Rtx23
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 1 257 Today, 05:34 AM
Last Post: Fr1Rtx23
  rev_dudidudida cavour13 1 235 Today, 12:25 AM
Last Post: 0xcreep
  [FREE] HTB HackTheBox CPTS CBBH CDSA CWEE exam preparation guide and hints Tamarisk 5 1,851 Yesterday, 08:42 PM
Last Post: Tamarisk

Forum Jump:


 Users browsing this forum: 1 Guest(s)