Vulnhub/ PG/ THM/ HTB
Quick Writeups for Vulnhub/ PG Machines/ THM/ HTB
Infosec Prep
USER
User : OSCP
User-Agent: * Disallow: /secret.txt
In robots.txt, we get base64 encoded Private SSH Key.
ssh oscp@IP_ADDRESS -i id_rsa
ROOT
SUID bash binary
/bin/bash -p
Unintended Methods:
https://falconspy.medium.com/infosec-prep-oscp-vulnhubwalkthrough-a09519236025
FunBoxEasy
USER : Dirbuster -> http://192.168.74.111/store/admin.php Login with admin:admin, edit image and upload PHP reverse shell. SSH with password.txt ROOT : sudo time /bin/bash
Dawn
USER : smbclient //192.168.178.11/ITDEPT
Management.log in :80/logs shows web-control running as root.
uploaded python shell in smb ITDEPT share with name 'web-control'
Got reverse shell with cron.
ROOT : checking for SUID BITS, found /usr/bin/zsh -> euid=0
Machine Categories
SSTI
HTB - Late (Image to Text Application built with Flask)
Important Machines Writeups
Execute sandboxed Lua scripts through the “EVAL” command using dofile(), Capturing NTLM hash via responder by connecting with //tun0-ip//share, Powerview and sharpHound, BloodHound for enumeration and Abusing GPO Permission via SharpGPOAbuse.exe
Enumerating subdomains and finding CMS "typo3", backend api call for SQLi, password cracking to get in typo3 panel, uploaded reverse shell, cracked user mozilla history to find credentials, getcap to find openssl binary to read and replace passwd file to get root.
Last updated
Was this helpful?