HackTheBox - Shibboleth

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 27

  • @null_1065
    @null_1065 2 года назад +19

    Interview with InsiderPHD, PowerSIEM video, Altered and Shibboleth walkthroughs, all in one week! Thank you for all your hard work and dedication Ippsec

  • @armancastell8006
    @armancastell8006 2 года назад +19

    Hi Ippsec! Thank you so much for your videos! Just wanted to say: When your reverse shell in Zabbix kept dying, there is a far easier way than doing this double-shell stunt. The second parameter of the system.run[command,mode] can be used for that. If you had set it to nowait, Zabbix would have started your shell without waiting for the command to return (thereby killing it), so it would keep running in the background ;)

    • @The_Dark_Cats
      @The_Dark_Cats 2 года назад

      That worked great! Thank for the tip.

  • @ellerionsnow3340
    @ellerionsnow3340 Год назад

    I found the hash and then was stuck trying to get a shell with ipmi using the SOL command. I thought I had enumerated everything but I missed the V Host. Once I saw that as the next step I got all the way to checking the sql version, down to googling for exploits and just went right over the exploit. Frustrated I had it! But didn't look hard enough at first. Thanks so much for another great video.

  • @willianjaques
    @willianjaques 2 года назад +3

    There is another way a bit easier to get shell through the Zabbix. In Administration > Scripts panel you can just create or edit/clone some script and put the bash reverse shell there. Then the script can be executed by clicking in the host in Monitoring > Hosts.

    • @tealeaf9260
      @tealeaf9260 2 года назад +1

      Cool, thanks! Good to note!
      For this box, I don't think the user you log in as has access to the Administration menu though. It seems the user is a "Zabbix Admin" rather than "Zabbix Super Admin", and so lacks access to that menu.

  • @robbie_984
    @robbie_984 2 года назад

    Shibboleth was such a good machine experience. I really enjoyed it. Took me longer than expected :) Didn't want to abuse sudo since it is not intended way. EDIT: seems it wouldn't work anyway lol

  • @michalczapnik1988
    @michalczapnik1988 2 года назад

    Great narrative. Thank you for sharing!

  • @RmDGaming77
    @RmDGaming77 2 года назад

    I tried the ssh key and found that you needed to be root to activate the service lol thanks Ippsec for this walk-through. Learned a lot from this.

  • @raj77in
    @raj77in 2 года назад

    Awesome walkthrough as usual. For connecting to mysql, you can give password in command line (thought not good practice :) ). You cannot have space between '-p' and password and then it will work

  • @berndeckenfels
    @berndeckenfels 2 года назад

    43:03 the private /tmp is a mount_namespaces(7)

  • @BennyM910
    @BennyM910 2 года назад

    You should do a video on your parrot box, they have changed it since and it's not as nice looking.

  • @razmjumehdi9069
    @razmjumehdi9069 2 года назад

    In your opinion, Blackarch linux better than Kali or Parrot? or Blackarch linux is a positiv point for me, when i am looking for a job opportunity related to Penetration Tester?

  • @alwan7777
    @alwan7777 2 года назад

    finally🥰thanks

  • @The_Dark_Cats
    @The_Dark_Cats 2 года назад

    As usual, thanks for the knowledge! When I did the box I did not have privileges to write to /dev/shm? However /tmp/ worked fine in my case.

  • @thomasandolf7365
    @thomasandolf7365 2 года назад +2

    how do you remember all command flags....

  • @frencikurti
    @frencikurti 2 года назад

    Great video as always :) I have a real pentest scenario where I have to do a double shell because the process terminates. Unfortunately your method of double shell didn't work as well. Is there any other alternative?

    • @ippsec
      @ippsec  2 года назад +2

      If you search Ippsec.rocks for nohup, you’ll see me do it correctly there on a different zabbix box 😂

    • @frencikurti
      @frencikurti 2 года назад

      @@ippsec thanks for the fast response. I tried nohup, but unfortunately it dies as well.

  • @v380riMz
    @v380riMz 2 года назад

    Still don't understand how you'd supposed to know the usage of IPMI

  • @Ms.Robot.
    @Ms.Robot. 2 года назад

    💪😍❤️💋

  • @agenericaccount3935
    @agenericaccount3935 2 года назад

    🎃 🥧 #1

  • @RuneAntonsen
    @RuneAntonsen 2 года назад

    Should have IPMI on kracken... 😂

    • @ippsec
      @ippsec  2 года назад +2

      I do have a ilo on it 😂 just always forget the ip, so it’s quicker to just push a button

  • @biswajitdutta6063
    @biswajitdutta6063 2 года назад +1

    1st comment