Skyfall - HTB
by paven - Saturday February 3, 2024 at 02:10 PM
#51
(Feb 04, 2024, 09:06 AM)DwightSchrute Wrote:
(Feb 04, 2024, 08:05 AM)izanamiidol Wrote:
(Feb 04, 2024, 07:53 AM)balckroot Wrote: After getting the home_backup.tar.gz file how to get the shell

mc cp --vid 3c498578-8dfe-43b7-b679-32a3fe42018f myminio/askyy/home_backup.tar.gz .

Does anyone provide some hints on how to achieve shell?

see .bashrc file, grab the vault api address and token and then use vault to connect via ssh

there is nothing useful in the .bashrc, neither an address nor an token. could you please explain a little bit more? Smile

You're looking in the wrong bashrc file.
Reply
#52
mc cp --vid 2b75346d-2a47-4203-ab09-3c9f878466b8 minio/askyy/home_backup.tar.gz ./
Reply
#53
Hi guys. I am trying to understand how the `prd23-s3-backend.skyfall.htb` was discovered. Was it via fetch feature or some bypass technique had been used? Thank you in advance.
Reply
#54
ok, now i got the vault token...but how to use it?
Reply
#55
the root is easy!
[Image: U6nO8Z7.png]
Reply
#56
(Feb 04, 2024, 10:34 AM)rat Wrote:
(Feb 04, 2024, 09:36 AM)N4v4S Wrote: Hi guys. I am trying to understand how the `prd23-s3-backend.skyfall.htb` was discovered. Was it via fetch feature or some bypass technique had been used? Thank you in advance.

http://demo.skyfall.htb/metrics%20
403 bypass

doing this i am gettin a 404

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#57
(Feb 04, 2024, 10:41 AM)DataNinja Wrote: the root is easy!
[Image: U6nO8Z7.png]

It seems you configured yaml config to be able to request root SSH one-time password from Vault and authenticate with one-time password.
Teach us Ninja how to fill yaml config!
Reply
#58
(Feb 04, 2024, 10:53 AM)berlik Wrote:
(Feb 04, 2024, 09:36 AM)N4v4S Wrote: Hi guys. I am trying to understand how the `prd23-s3-backend.skyfall.htb` was discovered. Was it via fetch feature or some bypass technique had been used? Thank you in advance.

http://demo.skyfall.htb/metrics%0a

nice finding it is bro.
Reply
#59
(Feb 04, 2024, 10:41 AM)DataNinja Wrote: the root is easy!
[Image: U6nO8Z7.png]

can we get a nudge on this?

UPDATE: finally got it 43 mins later, yes it is easy.. just try stuff
Reply
#60
Path to root is vault unseal command that sudo -l gives you. You need to grab the master token and use that to connect to the vault exactly same way as you did for the user.

Then try some other commands that you have privs to runand gain root access in a similar fashion as for the user.

And yes, that prd23 backend domain can be found out via 302 bypassing, try tab, or other chars, in hex, to bypass.

Also use vault instead of vlt of hashicorp, the first one has problems...  downloading the binary and unzipping is sufficient.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,588 3 minutes ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,941 8 hours ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,799 10 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,616 Today, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,269 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)