[HTB] Sea - Machine
by RedTeamer - Friday August 9, 2024 at 08:04 PM
(Aug 11, 2024, 05:01 AM)4rrows Wrote:
(Aug 10, 2024, 11:21 PM)mhsoraa Wrote: Any hits for command injection on root...

amay@sea:~$ curl http://127.0.0.1:8080

Unauthorized accessa
may@sea:~$

It's because it require credentials, portforward to access it

Thank you very much 4rrows.
Reply
anyone please tell me how to get root shell.
Reply
port forward to 8080 and intercept
Reply
(Aug 11, 2024, 01:05 PM)lucifer_devil_003 Wrote: anyone please tell me how to get root shell.

command injection on port 8080
Reply
(Aug 11, 2024, 11:33 AM)bl4ckp4nth3r3 Wrote: i initial thought this method was not work cuz the connection close after couple of secs. turns out it is all that is need to read root.txt though Big Grin

Me too! So, just add user to sudoers file:
echo 'amay ALL=(ALL) NOPASSWD:ALL' >> /etc/sudoers
run it with command injection
Reply
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt
Reply
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
(Aug 11, 2024, 05:46 PM)GilbertoCosta Wrote:
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))


ohh yes... forgot to tell it mate... sry...
Reply
(Aug 11, 2024, 06:04 PM)Liy4 Wrote:
(Aug 11, 2024, 05:46 PM)GilbertoCosta Wrote:
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))


ohh yes... forgot to tell it mate... sry...

thanks bro
Reply
(Aug 11, 2024, 06:29 PM)trevor69000 Wrote:
(Aug 11, 2024, 06:04 PM)Liy4 Wrote:
(Aug 11, 2024, 05:46 PM)GilbertoCosta Wrote:
(Aug 11, 2024, 04:56 PM)Liy4 Wrote:
(Aug 10, 2024, 10:21 PM)ametah Wrote: i got shell but permission denied to read user.txt at /home/amay/user.txt
I see password $2y$10$iOrk210RQSAzNCx6Vyq2X.aJ\/D.GuE4jRIikYiWrD3TM\/PjDnXm4q but don't know what to do with it.


* $2y$ = indicates the bcrypt algorithm
* 10 = is the cost factor, which determines how computationally intensive the hashing process is
* The rest of the string is the salt and the hashed password.

3200 | bcrypt $2*$, Blowfish (Unix)

hashcat -m 3200 -a 0 hash.txt /usr/share/wordlists/rockyou.txt

u need to remove back slash before crack Smile))


ohh yes... forgot to tell it mate... sry...

thanks bro


I've really come a long way... i was able to port forward and log into 127.0.0.1:8080 page, intercept in burp but what has now failed is that my ;nc injection parameters are not working thus not getting a root shell.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 73 2,317 2 hours ago
Last Post: louikizzz
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 89 8,091 2 hours ago
Last Post: Xploitd
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 10 622 6 hours ago
Last Post: chufoni
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 28 2,847 6 hours ago
Last Post: chufoni
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 375 93,589 6 hours ago
Last Post: Johe

Forum Jump:


 Users browsing this forum: 1 Guest(s)