Posts: 245
Threads: 29
Joined: Nov 2023
- sqlpad template injection to rce to get access on docker
- Crack hash for user found in shadow file
- Get user flag
- admin.sightless.htb running on 8080
- Portforward to access the vhost
- Intended (xss to get credentials)
- (Unintended) use metasploit chrome debugger to read /home/John/automation/administration.py for credentials
- (Again unintended) Portforward all the larger ports, chrome debugging and check the network, if session is preserved you'll get the credentials
- For root; reset ftp creds, login and find database.kbd, crack the password and find ssh keys
- Or you can use php-fpm to read root.text or to get shell
Thanks @paw for the rank!!
Posts: 44
Threads: 0
Joined: May 2024
thanks mate, great help This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 7
Threads: 0
Joined: Jun 2024
(Sep 08, 2024, 05:56 AM)macavitysworld Wrote: - sqlpad template injection to rce to get access on docker
- Crack hash for user found in shadow file
- Get user flag
- admin.sightless.htb running on 8080
- Portforward to access the vhost
- Intended (xss to get credentials)
- (Unintended) use metasploit chrome debugger to read /home/John/automation/administration.py for credentials
- (Again unintended) Portforward all the larger ports, chrome debugging and check the network, if session is preserved you'll get the credentials
- For root; reset ftp creds, login and find database.kbd, crack the password and find ssh keys
- Or you can use php-fpm to read root.text or to get shell
For the mestasploit debugger, i get an error 404 not found, even tought froxlor is accessible with broswer on port 4445; for the xss, i guess its the one who require admin browsing in a specific place, but it seem to never happens. Could you help me?
Posts: 30
Threads: 3
Joined: Aug 2023
(Sep 08, 2024, 05:56 AM)macavitysworld Wrote: - sqlpad template injection to rce to get access on docker
- Crack hash for user found in shadow file
- Get user flag
- admin.sightless.htb running on 8080
- Portforward to access the vhost
- Intended (xss to get credentials)
- (Unintended) use metasploit chrome debugger to read /home/John/automation/administration.py for credentials
- (Again unintended) Portforward all the larger ports, chrome debugging and check the network, if session is preserved you'll get the credentials
- For root; reset ftp creds, login and find database.kbd, crack the password and find ssh keys
- Or you can use php-fpm to read root.text or to get shell
Thanks for the tips, very usefull !!
Posts: 18
Threads: 0
Joined: Aug 2024
Sep 09, 2024, 04:20 AM
(This post was last modified: Sep 09, 2024, 04:26 AM by Detector6.)
Great tips. Hash was hard to format. Any examples on hashcat or john?
(Sep 09, 2024, 04:20 AM)Detector6 Wrote: Great tips. Hash was hard to format. Any examples on hashcat or john?
hashcat -m1800 -a 0 shadow /usr/share/seclists/Passwords/Leaked-Databases/rockyou.txt
Posts: 1
Threads: 0
Joined: Sep 2024
Sep 09, 2024, 11:13 PM
(This post was last modified: Sep 09, 2024, 11:25 PM by arturspro4.)
(Sep 08, 2024, 05:56 AM)macavitysworld Wrote: - sqlpad template injection to rce to get access on docker
- Crack hash for user found in shadow file
- Get user flag
- admin.sightless.htb running on 8080
- Portforward to access the vhost
- Intended (xss to get credentials)
- (Unintended) use metasploit chrome debugger to read /home/John/automation/administration.py for credentials
- (Again unintended) Portforward all the larger ports, chrome debugging and check the network, if session is preserved you'll get the credentials
- For root; reset ftp creds, login and find database.kbd, crack the password and find ssh keys
- Or you can use php-fpm to read root.text or to get shell
hi there im new to HTB and im learning still just a quick question how do i find admin.sightless.htb that is running on 8080 i tried fuzz/gobuster etc but i seem to not find admin and how do i discover that there is something running on port 8080 if someone could be give me tips of finding them thank you.
NVM: i went ugaa bungaa i forgot what i can do with those
|