Apr 07, 2025, 01:50 PM
|
WhiteRabbit Hack the Box Season 7 (Linux Insane)
by RedBlock - Saturday April 5, 2025 at 05:26 PM
|
|
Apr 07, 2025, 03:18 PM
just analyze the binary, reverse it and take a close look at the sql table with the command logs earlier.
Apr 07, 2025, 03:26 PM
(This post was last modified: Apr 07, 2025, 03:32 PM by ikbenwieikben.)
(Apr 07, 2025, 12:46 PM)Kelesha007 Wrote: Okay so I got the file bob.7z. But I am failing retrieving the password for it. Made a pass generator once got a "successful" password that gave an error wrong password. Can someone help with that? 7z2john and then john to crack. (Apr 07, 2025, 11:09 AM)Cipiki Wrote: I'm stuck with `neo-password-generator`, i don't understand what i need to do here for get neo password. I have the neo pub.key but I can't find the password generator. Where to find it?
Apr 07, 2025, 03:35 PM
(Apr 07, 2025, 03:26 PM)ikbenwieikben Wrote: You can find it on /opt bro
Apr 07, 2025, 04:38 PM
(This post was last modified: Apr 07, 2025, 05:14 PM by ikbenwieikben.)
(Apr 07, 2025, 03:35 PM)relentless96 Wrote:(Apr 07, 2025, 03:26 PM)ikbenwieikben Wrote: @ssh bob no /opt dir. restic download to loacal machine no /opt dir on the system... please explain exactly where I can find it. just for sanity. :-) I am working on the sucrack part with my passwd file hoping to get the priv esc to work. still don't know where you guys found the passgen binary... I a did not mean neo but morpheus ssh and pub key. I only have bob@ssh @ port 2222 as access. Never mind the box is unstable, now I can log in with the id_rsa to morpheus@whiterabbit... pff sometimes. but got user.
Apr 07, 2025, 06:14 PM
(This post was last modified: Apr 07, 2025, 06:16 PM by popsmokes.
Edit Reason: formatting
)
7z File Password
If you're still having problems with the 7z file, it is possible to use https://github.com/philsmd/7z2hashcat to retrieve the hash of the password and then use hashcat to crack it. Make sure to format it correctly with (user:hash) and run it with hashcat -m 11600 hash.txt -w [wordlist here] --userFrom here, the path to ssh is quite clear for user bob. Make sure to use the correct port. neo-password-generator Here is where I am currently stuck. Analyzing the binary gave me two attack vectors; either calling the binary with the correct timestamp or replicating the code and messing around with it manually. I have tried both approaches without luck. Currently chugging through a wordlist containing 1000+ permutations of passwords for the target user (neo). However, either the machine is unstable or my compiled binary of sucrack is unstable - either way it sometimes just halts processing. Thankful for any and all tips.
Apr 07, 2025, 09:34 PM
calling the binary will not work because you can not manipulate the time using milliseconds (which is needed). you have to reverse the algorythm and write your own generator that produces 1000 entries. then bruteforce ssh.
(Apr 07, 2025, 01:06 AM)bl4cksku11 Wrote: Once you dump the correct database, you'll be able to see some restic credentials, what you can do is to restore the data in order to exfiltrate bob's ssh private key: Very nice. But how to get the value of HMAC_KEY? Can anyone give me some hints? Note: I found it in JSON file. Thanks for providing the script.
Apr 08, 2025, 04:46 AM
(Apr 07, 2025, 12:46 PM)Kelesha007 Wrote: Okay so I got the file bob.7z. But I am failing retrieving the password for it. Made a pass generator once got a "successful" password that gave an error wrong password. Can someone help with that? you got to generate a hash from bob.7z and then use john to crack the hash
Apr 08, 2025, 07:10 AM
Another way to exploit the SQLi
sqlmap tamper: import hmacsqlmap command: sqlmap -u http://28efa8f7df.whiterabbit.htb/webhook/d96af3a4-21bd-4bcb-bd34-37bfc67dfd1d --data '{"campaign_id":1,"email":"*","message":"Clicked Link"}' -H "Content-Type: application/json" --risk 3 --level 5 --tamper=hmac_tamper.py --dump-all -D temp --batch --threads=5 --time-sec=3 --no-escape |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot | 92 | 8,466 |
4 hours ago Last Post: unionstorm |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 25 | 2,521 |
11 hours ago Last Post: cry_elite |
||
| CBBH Write Ups | 25 | 6,581 |
11 hours ago Last Post: cry_elite |
||
| [FREE] CPTS 12 FLAGS | 84 | 2,922 |
11 hours ago Last Post: justhelpmefly |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 33 | 3,096 |
11 hours ago Last Post: justhelpmefly |
||
