HackTheBox - Sau

Поделиться
HTML-код
  • Опубликовано: 1 авг 2024
  • 00:00 - Intro
    00:40 - Start of nmap
    02:00 - Examining the website, playing with the basket, trying SSTI/SQL Injection special characters
    04:30 - Looking at the settings, discovering we can perform a SSRF and get the response back. Grabbing localhost:80
    06:10 - The local website runs maltrail 0.53, examining the exploit then manually exploiting it to get a shell
    09:10 - Shell returned, checking if we really needed to encode the payload
    13:00 - When systemctl runs status, it sends us to less which we can escape out of and run as root

Комментарии • 26

  • @AdrianCrovetto
    @AdrianCrovetto 6 месяцев назад +6

    Nice walk through! For reading files within `less`, you can use similar syntax to what you had in executing the shell - `!cat `. This will print out the contents of whatever you supply in place of ``. This will work in most things that use pagers, such as `less`, `more`, `vim`, etc. I have no doubt you are aware of this IppSec, I just wanted to be thorough for anyone who reads your comments and wants to learn/understand more.

  • @blademan3421
    @blademan3421 6 месяцев назад +1

    Happy new year! Thanks for all the amazing videos

  • @carlosnunez9091
    @carlosnunez9091 6 месяцев назад

    Welcome back, Ippsec! Thank you for your content!

  • @nournote
    @nournote 6 месяцев назад +2

    Always top notch quality content.

  • @noptrix4273
    @noptrix4273 6 месяцев назад +1

    A simple comment to appreciate the content here and leave some love for it. ❤

  • @proalionline
    @proalionline 6 месяцев назад

    Happy new year! Pro

  • @AUBCodeII
    @AUBCodeII 6 месяцев назад +3

    Happy new year, Ippy. We missed u

  • @nightfox9007
    @nightfox9007 6 месяцев назад +1

    💙💙

  • @SplitUnknown
    @SplitUnknown 6 месяцев назад +1

    ❤❤

  • @vishalrai9442
    @vishalrai9442 6 месяцев назад +1

    ♥️

  • @ractor6175
    @ractor6175 6 месяцев назад +5

    11:40 running systemd trail command with sudo executes root shell

  • @lonelyorphan9788
    @lonelyorphan9788 6 месяцев назад +2

    Ippsec rocks! 🙂

  • @tg7943
    @tg7943 6 месяцев назад +1

    Push!

  • @vviolin343
    @vviolin343 6 месяцев назад

    hey ippsec, do you know how many time i need to wait to post a machine writeup?
    i posted a video here on youtube solving Surveillance one week after the original release, when the Insane machine was already released but HTB deleted it alleging spoiler and copyright

    • @malikkkk2679
      @malikkkk2679 6 месяцев назад

      you need to wait until it's retired

  • @inquinimaris
    @inquinimaris 6 месяцев назад +2

    Tsk, shame I didn't make it through this one.

  • @felixkiprop48
    @felixkiprop48 6 месяцев назад

    sudo. I repeat sudo!!!!

  • @berthold9582
    @berthold9582 6 месяцев назад

    I didn't understand the ssrf part

  • @SoL-cl1pw
    @SoL-cl1pw 6 месяцев назад

    Did the nmap scan took you 5 hours to do?

    • @ractor6175
      @ractor6175 6 месяцев назад +1

      Around 10 min bro
      But 5 hours wtf

  • @neunzehnvierundachtzig
    @neunzehnvierundachtzig 6 месяцев назад

    I thought you already made video on this hmm, False memory ig.

  • @sotecluxan4221
    @sotecluxan4221 6 месяцев назад

  • @itsmochino
    @itsmochino 6 месяцев назад

    ❤❤

  • @hannahprobably5765
    @hannahprobably5765 6 месяцев назад

  • @SplitUnknown
    @SplitUnknown 6 месяцев назад

    ♥️♥️