Apr 14, 2024, 11:23 AM
path it's /uploads/images/name.php i was able to bypass the image extension check but i think we have to phar it or it's simpler?
|
HTB - Usage
by Art10n - Saturday April 13, 2024 at 06:50 PM
|
|
Apr 14, 2024, 11:23 AM
path it's /uploads/images/name.php i was able to bypass the image extension check but i think we have to phar it or it's simpler?
Apr 14, 2024, 11:52 AM
On the machine, as dash, any hints on how to pivot to xander?
Apr 14, 2024, 12:28 PM
xender and dash is straight forward
Apr 14, 2024, 12:35 PM
(Apr 14, 2024, 12:35 PM)mrhi Wrote:(Apr 14, 2024, 11:52 AM)sqad Wrote: On the machine, as dash, any hints on how to pivot to xander? Legit saw that file, tried to read it didnt work and moved along even tho google said that was the file to store it. (Apr 14, 2024, 12:32 PM)3thic4lh4ck3r Wrote:(Apr 14, 2024, 12:30 PM)osamy7592 Wrote:(Apr 14, 2024, 12:28 PM)3thic4lh4ck3r Wrote:(Apr 14, 2024, 12:02 PM)osamy7592 Wrote: guys all u need to make .php run .. from BurpSuite just convert content type from images/jpeg to file/php This useful with sudo -l? (Apr 14, 2024, 12:42 PM)sqad Wrote:(Apr 14, 2024, 12:35 PM)mrhi Wrote:(Apr 14, 2024, 11:52 AM)sqad Wrote: On the machine, as dash, any hints on how to pivot to xander? rooted overview: 1.forget password vuln to sql injection (use sqlmap) 2. crack the admin hash(browfish) and login 3. file upload(bypass) ---> rce (avatar upload section) 4. get a reverse shell as use dash and get a user flag 5. check for hidden files and get xander password and login via ssh 6. with root use this one https://book.hacktricks.xyz/linux-harden...are-tricks u have to read it carefull and u will understand it 7. run the sudo -l and then proceed as sudo binary_usage and u get root flag (Apr 14, 2024, 01:31 PM)pwn1 Wrote:(Apr 14, 2024, 12:42 PM)sqad Wrote:(Apr 14, 2024, 12:35 PM)mrhi Wrote:(Apr 14, 2024, 11:52 AM)sqad Wrote: On the machine, as dash, any hints on how to pivot to xander? I think I know which one you are talking about just struggling to get it to work now (Apr 14, 2024, 01:31 PM)pwn1 Wrote:(Apr 14, 2024, 12:42 PM)sqad Wrote:(Apr 14, 2024, 12:35 PM)mrhi Wrote:(Apr 14, 2024, 11:52 AM)sqad Wrote: On the machine, as dash, any hints on how to pivot to xander? got the exploit to work found .ssh key but that is completly broken for some reason
Apr 14, 2024, 04:55 PM
(This post was last modified: Apr 14, 2024, 05:07 PM by membizhomeless.)
anyway we can get a shell as root? already rooted the box but wondering if i can get a shell as root instead of just reading files
tried to read /etc/shadow but no success EDIT: you can just read /root/.ssh/id_rsa
Apr 14, 2024, 05:57 PM
I'm so sad, I can't find the xander pw
Apr 14, 2024, 06:11 PM
|
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 31 | 2,934 |
6 minutes ago Last Post: hwzus47431 |
||
| CBBH Write Ups | 24 | 6,439 |
44 minutes ago Last Post: reze |
||
|
|
[FREE] HackTheBox All Cheatsheets | 12 | 687 |
49 minutes ago Last Post: 69420 |
|
| [FREE] CPTS 12 FLAGS | 77 | 2,505 |
52 minutes ago Last Post: reze |
||
| HTB Eloquia User and Root Flags - Insane Box | 14 | 518 |
1 hour ago Last Post: zamizamo |
||