Office - HTB Writeup {Begineer}
by GWTW - Tuesday February 20, 2024 at 05:34 AM
#11
thanks. I want to earn credit to unlock the writeup.
Reply
#12
I got till vault creds using mimikatz but stuck after that cant find the password using dpapi::creds and masterkey
any hints would be appreciated
Reply
#13
Sound great to hear that folks.

You can rate my profile via this link
https://breachforums.rs/reputation.php?uid=97449

"Rate User" for future endorsement!!
Reply
#14
Thank you for posting this.
Reply
#15
Very nice and handy Smile Good writeup!
Reply
#16
have they patched the unintended mysql pathway to root yet?
Reply
#17
Thanks for explanation
(Feb 20, 2024, 05:34 AM)GWTW Wrote: I would like to share you the Office - HTB Writeup. It's the Hard severity box and too much steps to understand and take part in.

For those who don't have enough 8 credits, 
you can earn 1 credit as per one reply/post in the forum' posts and come back with enough credits to support the efforts.
Participate in the forum and enjoy the threads!

User Flag
-------------
Web DB Credential - Joomla. 4.2.7 -  CVE-2023-23752
Joomla Administrator web page bruteforce to reverse shell.
Earn user flag with tstark acc.

Root Flag
-------------
ppotts shell - Libre Vulnerability
hhogan shell - Vault Credential revealed
Administartor - SharpGPOAbuse to root




Bests,
GWTW
Reply
#18
tyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Reply
#19
Cool. Thank you very much.
Reply
#20
[quote="GWTW" pid='438725' fecha='1708407267']
Me gustaría compartirles la Oficina - HTB Writeup. Es el cuadro de gravedad Difícil y hay demasiados pasos para comprender y participar.

Para aquellos que no tienen suficientes 8 créditos, 
puedes ganar 1 crédito por cada respuesta/publicación en las publicaciones del foro y regresar con suficientes créditos para apoyar los esfuerzos.
¡Participa en el foro y disfruta de los hilos!

Bandera de usuario
-------------
Credencial de base de datos web - Joomla. 4.2.7 - CVE-2023-23752
Fuerza bruta de la página web del administrador de Joomla para invertir el shell.
Obtenga la bandera de usuario con tstark acc.

Bandera raíz
-------------
shell ppotts - Vulnerabilidad libre
hhogan shell - Se revela la credencial de Vault
Administrador - SharpGPOAbuse para rootear




mejores,
GWTW
[/cita]

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: English Only Forum| https://breachforums.rs/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 31 2,942 39 minutes ago
Last Post: hwzus47431
  CBBH Write Ups hiddenhacker 24 6,446 1 hour ago
Last Post: reze
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 12 689 1 hour ago
Last Post: 69420
  [FREE] CPTS 12 FLAGS pulsebreaker 77 2,516 1 hour ago
Last Post: reze
  HTB Eloquia User and Root Flags - Insane Box 69646B 14 522 1 hour ago
Last Post: zamizamo

Forum Jump:


 Users browsing this forum: 1 Guest(s)