[HTB] Sea - Machine
by RedTeamer - Friday August 9, 2024 at 08:04 PM
(Aug 11, 2024, 05:01 AM)4rrows Wrote:
(Aug 10, 2024, 11:21 PM)mhsoraa Wrote: Any hits for command injection on root...

amay@sea:~$ curl http://127.0.0.1:8080

Unauthorized accessa
may@sea:~$

It's because it require credentials, portforward to access it

Thank you very much 4rrows.
Reply
anyone please tell me how to get root shell.
Reply
port forward to 8080 and intercept
Reply
(Aug 11, 2024, 01:05 PM)lucifer_devil_003 Wrote: anyone please tell me how to get root shell.

command injection on port 8080
Reply
(Aug 11, 2024, 11:33 AM)bl4ckp4nth3r3 Wrote: i initial thought this method was not work cuz the connection close after couple of secs. turns out it is all that is need to read root.txt though Big Grin

Me too! So, just add user to sudoers file:
echo 'amay ALL=(ALL) NOPASSWD:ALL' >> /etc/sudoers
run it with command injection
Reply
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt
Reply
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
(Aug 11, 2024, 05:46 PM)GilbertoCosta Wrote:
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))


ohh yes... forgot to tell it mate... sry...
Reply
(Aug 11, 2024, 06:04 PM)Liy4 Wrote:
(Aug 11, 2024, 05:46 PM)GilbertoCosta Wrote:
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))


ohh yes... forgot to tell it mate... sry...

thanks bro
Reply
(Aug 11, 2024, 06:29 PM)trevor69000 Wrote:
(Aug 11, 2024, 06:04 PM)Liy4 Wrote:
(Aug 11, 2024, 05:46 PM)GilbertoCosta Wrote:
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))


ohh yes... forgot to tell it mate... sry...

thanks bro


I've really come a long way... i was able to port forward and log into 127.0.0.1:8080 page, intercept in burp but what has now failed is that my ;nc injection parameters are not working thus not getting a root shell.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,170 1 hour ago
Last Post: kkkato
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 20 2,491 Yesterday, 11:06 PM
Last Post: op334
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 396 Yesterday, 10:36 PM
Last Post: op334
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 369 92,003 Yesterday, 04:10 PM
Last Post: sabbyahmed
  CBBH Write Ups hiddenhacker 22 6,226 Yesterday, 06:39 AM
Last Post: Usercomplex

Forum Jump:


 Users browsing this forum: 1 Guest(s)